ASC-1: an authenticated encryption stream cipher
From MaRDI portal
Publication:2889882
DOI10.1007/978-3-642-28496-0_21zbMATH Open1292.94083OpenAlexW2222575769MaRDI QIDQ2889882FDOQ2889882
Authors: Goce Jakimoski, Samant Khajuria
Publication date: 8 June 2012
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-28496-0_21
Recommendations
message authenticationauthenticated encryptionstream ciphersblock ciphersuniversal hash functionsmaximum differential probability
Cites Work
- The Design of a Stream Cipher LEX
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
- Improving the upper bound on the maximum differential and the maximum linear hull probability for SPN structures and AES.
- Title not available (Why is that?)
- Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations
- Fast Software Encryption
- New structure of block ciphers with provable security against differential and linear cryptanalysis
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- Title not available (Why is that?)
- Title not available (Why is that?)
- Helix: fast encryption and authentication in a single cryptographic primitive.
- On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis
- A New Attack on the LEX Stream Cipher
- Resynchronization Attacks on WG and LEX
- On Efficient Message Authentication Via Block Cipher Design Techniques
Cited In (3)
Uses Software
This page was built for publication: ASC-1: an authenticated encryption stream cipher
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2889882)