Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
From MaRDI portal
Publication:2016427
Recommendations
- scientific article; zbMATH DE number 1689041
- On modes of operations of a block cipher for authentication and authenticated encryption
- scientific article; zbMATH DE number 67088
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
- Stream ciphers, a perspective. (Abstract)
- Stream Ciphers
- scientific article; zbMATH DE number 3912275
- Implementation and analysis of stream ciphers based on the elliptic curves
- Analysis and design of stream ciphers
- Stream and finite automaton ciphersystems
Cites work
- scientific article; zbMATH DE number 1583788 (Why is no real title available?)
- scientific article; zbMATH DE number 1583804 (Why is no real title available?)
- scientific article; zbMATH DE number 1722692 (Why is no real title available?)
- scientific article; zbMATH DE number 1951604 (Why is no real title available?)
- scientific article; zbMATH DE number 1418297 (Why is no real title available?)
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- A New Algorithm for Inner Product
- A Provable-Security Treatment of the Key-Wrap Problem
- A general mixing strategy for the ECB-Mix-ECB mode of operation
- A new multi-linear universal hash family
- A short universal hash function from bit rotation, and applications to blockcipher modes
- A software-optimized encryption algorithm
- A trade-off between collision probability and key size in universal hashing using polynomials
- Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3--7, 2000. Proceedings
- Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3
- Codes Which Detect Deception
- Complete characterization of security notions for probabilistic private-key encryption
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions
- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
- Fast Software Encryption
- Fast Software Encryption
- Fast Software Encryption
- Fast evaluation of polynomials by rational preparation
- Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5--7, 2004. Revised papers.
- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption
- Helix: fast encryption and authentication in a single cryptographic primitive.
- MMH: Software message authentication in the Gbit/second rates
- New hash functions and their use in authentication and set equality
- On fast and provably secure message authentication based on universal hashing
- On the Security of IV Dependent Stream Ciphers
- Progress in Cryptology - INDOCRYPT 2004
- Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher
- Stronger Security Bounds for Wegman-Carter-Shoup Authenticators
- Universal classes of hash functions
- Universal hashing and authentication codes
Cited in
(6)- On the Security of IV Dependent Stream Ciphers
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
- On modes of operations of a block cipher for authentication and authenticated encryption
- Survey of information security
- BTM: a single-key, inverse-cipher-free mode for deterministic authenticated encryption
- An AEAD variant of the Grain stream cipher
This page was built for publication: Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2016427)