Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
From MaRDI portal
Publication:2016427
DOI10.1007/s12095-013-0097-7zbMath1291.94148OpenAlexW2019475511WikidataQ122065678 ScholiaQ122065678MaRDI QIDQ2016427
Publication date: 20 June 2014
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-013-0097-7
authenticationauthenticated encryption with associated datauniversal hash functionmodes of operationsdeterministic authenticated encryptionstream cipher with initialisation vector
Related Items
On modes of operations of a block cipher for authentication and authenticated encryption ⋮ Survey of information security ⋮ Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A new multi-linear universal hash family
- A general mixing strategy for the ECB-Mix-ECB mode of operation
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- Universal hashing and authentication codes
- Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3--7, 2000. Proceedings
- Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5--7, 2004. Revised papers.
- A trade-off between collision probability and key size in universal hashing using polynomials
- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes
- Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3
- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
- Complete characterization of security notions for probabilistic private-key encryption
- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption
- On Fast and Provably Secure Message Authentication Based on Universal Hashing
- On the Security of IV Dependent Stream Ciphers
- A Provable-Security Treatment of the Key-Wrap Problem
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Codes Which Detect Deception
- A software-optimized encryption algorithm
- MMH: Software message authentication in the Gbit/second rates
- Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions
- Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher
- Stronger Security Bounds for Wegman-Carter-Shoup Authenticators
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Fast Software Encryption
- A New Algorithm for Inner Product
- Fast evaluation of polynomials by rational preparation
- Progress in Cryptology - INDOCRYPT 2004
- Fast Software Encryption
- Fast Software Encryption
- Fast Software Encryption
This page was built for publication: Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector