Attacks and security proofs of EAX-prime
From MaRDI portal
Publication:2946885
DOI10.1007/978-3-662-43933-3_17zbMATH Open1321.94110OpenAlexW1429760160MaRDI QIDQ2946885FDOQ2946885
Authors: Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-43933-3_17
Recommendations
Cites Work
- Fast Software Encryption
- A Provable-Security Treatment of the Key-Wrap Problem
- Progress in Cryptology - INDOCRYPT 2003
- OMAC: one-key CBC MAC.
- Title not available (Why is that?)
- Title not available (Why is that?)
- Power Analysis Attacks
- Tweakable block ciphers
- Revisiting Higher-Order DPA Attacks:
- Applied Cryptography and Network Security
- Topics in Cryptology – CT-RSA 2006
- Fast Software Encryption
- Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5--7, 2004. Revised papers.
- Title not available (Why is that?)
Cited In (4)
This page was built for publication: Attacks and security proofs of EAX-prime
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946885)