Attacks and security proofs of EAX-prime
From MaRDI portal
Publication:2946885
Recommendations
Cites work
- scientific article; zbMATH DE number 1302834 (Why is no real title available?)
- scientific article; zbMATH DE number 1759268 (Why is no real title available?)
- scientific article; zbMATH DE number 1878319 (Why is no real title available?)
- A Provable-Security Treatment of the Key-Wrap Problem
- Applied Cryptography and Network Security
- Fast Software Encryption
- Fast Software Encryption
- Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5--7, 2004. Revised papers.
- OMAC: one-key CBC MAC.
- Power Analysis Attacks
- Progress in Cryptology - INDOCRYPT 2003
- Revisiting Higher-Order DPA Attacks:
- Topics in Cryptology – CT-RSA 2006
- Tweakable block ciphers
Cited in
(4)
This page was built for publication: Attacks and security proofs of EAX-prime
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946885)