Fast Software Encryption

From MaRDI portal
Revision as of 15:46, 13 March 2024 by Import240313020336 (talk | contribs) (Created automatically from import240313020336)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5473578

DOI10.1007/b137506zbMath1140.68382OpenAlexW4214882369WikidataQ28000487 ScholiaQ28000487MaRDI QIDQ5473578

Daniel J. Bernstein

Publication date: 22 June 2006

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b137506




Related Items

Another Look at TightnessVariants of Wegman-Carter message authentication code supporting variable tag lengthsHalftimeHash: modern hashing without 64-bit multipliers or finite fieldsOn modes of operations of a block cipher for authentication and authenticated encryptionVariationally universal hashingPartition oracles from weak key forgeriesIncremental cryptography revisited: PRFs, nonces and modular designOptimal forgeries against polynomial-based MACs and GCMThe Missing Difference problem, and its applications to counter mode encryptionCBCR: CBC MAC with rotating transformationsEfficient schemes for committing authenticated encryptionA new multi-linear universal hash familyConnecting tweakable and multi-key blockcipher securityTweetNaCl: A Crypto Library in 100 TweetsOn Weak Keys and Forgery Attacks Against Polynomial-Based MAC SchemesIntegrity Analysis of Authenticated Encryption Based on Stream CiphersLatin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of ForróLatin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of ForróMoving a step of ChaCha in syncopated rhythmQuantum linearization attacksBuilding blocks of sharding blockchain systems: concepts, approaches, and open problemsOn weak keys and forgery attacks against polynomial-based MAC schemesSemantic foundations for cost analysis of pipeline-optimized programsUniversal hashing based on field multiplication and (near-)MDS matricesOn the security of keyed hashing based on public permutationsA trade-off between collision probability and key size in universal hashing using polynomialsQuantum key distribution with PRF(Hash, Nonce) achieves everlasting securityOn Efficient Message Authentication Via Block Cipher Design TechniquesEvaluating Bernstein-Rabin-Winograd polynomialsConcealment and Its Applications to Authenticated EncryptionRelated-Key Almost Universal Hash Functions: Definitions, Constructions and ApplicationsThe design and evolution of OCBThe Software Performance of Authenticated-Encryption ModesModes of operations for encryption and authentication using stream ciphers supporting an initialisation vectorKey-Recovery Attacks on Universal Hash Function Based MAC AlgorithmsToward Acceleration of RSA Using 3D Graphics HardwareThe circulant hash revisitedImproved linear approximations to ARX ciphers and attacks against ChaChaPolyE+CTR: A Swiss-Army-Knife Mode for Block CiphersPoly1305-AESBuilding Blockcipher from Tweakable Blockcipher: Extending FSE 2009 ProposalEWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MACA quantum hash function with grouped coarse-grained boson samplingSingle-trace side-channel analysis on polynomial-based MAC schemesQuantum key distribution using universal hash functions over finite fields