Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
DOI10.1007/S12095-013-0097-7zbMATH Open1291.94148OpenAlexW2019475511WikidataQ122065678 ScholiaQ122065678MaRDI QIDQ2016427FDOQ2016427
Authors: Palash Sarkar
Publication date: 20 June 2014
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-013-0097-7
Recommendations
- scientific article; zbMATH DE number 1689041
- On modes of operations of a block cipher for authentication and authenticated encryption
- scientific article; zbMATH DE number 67088
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
- Stream ciphers, a perspective. (Abstract)
- Stream Ciphers
- scientific article; zbMATH DE number 3912275
- Implementation and analysis of stream ciphers based on the elliptic curves
- Analysis and design of stream ciphers
- Stream and finite automaton ciphersystems
authenticationauthenticated encryption with associated datauniversal hash functionmodes of operationsdeterministic authenticated encryptionstream cipher with initialisation vector
Cites Work
- MMH: Software message authentication in the Gbit/second rates
- Fast Software Encryption
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- Title not available (Why is that?)
- On fast and provably secure message authentication based on universal hashing
- Codes Which Detect Deception
- A New Algorithm for Inner Product
- Title not available (Why is that?)
- Progress in Cryptology - INDOCRYPT 2004
- Title not available (Why is that?)
- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
- Complete characterization of security notions for probabilistic private-key encryption
- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption
- A Provable-Security Treatment of the Key-Wrap Problem
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Title not available (Why is that?)
- Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher
- Stronger Security Bounds for Wegman-Carter-Shoup Authenticators
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Title not available (Why is that?)
- Universal hashing and authentication codes
- A new multi-linear universal hash family
- Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions
- Fast evaluation of polynomials by rational preparation
- A trade-off between collision probability and key size in universal hashing using polynomials
- On the Security of IV Dependent Stream Ciphers
- Fast Software Encryption
- Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3--7, 2000. Proceedings
- A general mixing strategy for the ECB-Mix-ECB mode of operation
- Helix: fast encryption and authentication in a single cryptographic primitive.
- A software-optimized encryption algorithm
- Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5--7, 2004. Revised papers.
- A short universal hash function from bit rotation, and applications to blockcipher modes
- Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3
- Fast Software Encryption
Cited In (6)
- On modes of operations of a block cipher for authentication and authenticated encryption
- Survey of information security
- An AEAD variant of the Grain stream cipher
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
- BTM: a single-key, inverse-cipher-free mode for deterministic authenticated encryption
- On the Security of IV Dependent Stream Ciphers
Uses Software
This page was built for publication: Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2016427)