Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector (Q2016427): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s12095-013-0097-7 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2019475511 / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q122065678 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707451 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707428 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Security of IV Dependent Stream Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stronger Security Bounds for Wegman-Carter-Shoup Authenticators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941857 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universal classes of hash functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A General Construction of Tweakable Block Ciphers and Different Modes of Operations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4413853 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Codes Which Detect Deception / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes / rank
 
Normal rank
Property / cites work
 
Property / cites work: MMH: Software message authentication in the Gbit/second rates / rank
 
Normal rank
Property / cites work
 
Property / cites work: HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778864 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Complete characterization of security notions for probabilistic private-key encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Progress in Cryptology - INDOCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3--7, 2000. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast evaluation of polynomials by rational preparation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: A software-optimized encryption algorithm / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Provable-Security Treatment of the Key-Wrap Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5--7, 2004. Revised papers. / rank
 
Normal rank
Property / cites work
 
Property / cites work: A new multi-linear universal hash family / rank
 
Normal rank
Property / cites work
 
Property / cites work: A general mixing strategy for the ECB-Mix-ECB mode of operation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: A trade-off between collision probability and key size in universal hashing using polynomials / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Fast and Provably Secure Message Authentication Based on Universal Hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universal hashing and authentication codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: New hash functions and their use in authentication and set equality / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Algorithm for Inner Product / rank
 
Normal rank

Latest revision as of 15:12, 8 July 2024

scientific article
Language Label Description Also known as
English
Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
scientific article

    Statements

    Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector (English)
    0 references
    0 references
    20 June 2014
    0 references
    stream cipher with initialisation vector
    0 references
    universal hash function
    0 references
    authentication
    0 references
    authenticated encryption with associated data
    0 references
    deterministic authenticated encryption
    0 references
    modes of operations
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers