Authenticated Encryption with Small Stretch (or, How to Accelerate AERO)
From MaRDI portal
Publication:2817823
DOI10.1007/978-3-319-40367-0_22zbMath1346.94116MaRDI QIDQ2817823
Publication date: 2 September 2016
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-40367-0_22
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- On the construction of pseudorandom permutations: Luby-Rackoff revisited
- A Modular Framework for Building Variable-Input-Length Tweakable Ciphers
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- GCM Security Bounds Reconsidered
- Robust Authenticated-Encryption AEZ and the Problem That It Solves
- The Software Performance of Authenticated-Encryption Modes
- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption
- Breaking and provably repairing the SSH authenticated encryption scheme
- A Provable-Security Treatment of the Key-Wrap Problem
- Invertible Universal Hashing and the TET Encryption Mode
- BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption
- Advances in Cryptology - CRYPTO 2003
- Improved Security Analysis of XEX and LRW Modes
- The Security of the Extended Codebook (XCB) Mode of Operation
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Fast Software Encryption
- Fast Software Encryption
- Information Security and Cryptology
- Topics in Cryptology – CT-RSA 2004