Online ciphers from tweakable blockciphers
From MaRDI portal
Publication:3073710
Recommendations
Cites work
- scientific article; zbMATH DE number 3937099 (Why is no real title available?)
- scientific article; zbMATH DE number 1942410 (Why is no real title available?)
- scientific article; zbMATH DE number 1942411 (Why is no real title available?)
- scientific article; zbMATH DE number 1842498 (Why is no real title available?)
- scientific article; zbMATH DE number 1406775 (Why is no real title available?)
- Efficient implementation of the Galois counter mode using a carry-less multiplier and a fast reduction algorithm
- Format-preserving encryption
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- How to Enrich the Message Space of a Cipher
- New AES Software Speed Records
- On the construction of pseudorandom permutations: Luby-Rackoff revisited
- On-line ciphers and the Hash-CBC constructions
- Practical symmetric on-line encryption.
- Progress in Cryptology - INDOCRYPT 2004
- Progress in Cryptology - INDOCRYPT 2004
- Selected Areas in Cryptography
- Selected Areas in Cryptography
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Topics in Cryptology – CT-RSA 2004
- Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC
Cited in
(19)- Implicit key-stretching security of encryption schemes
- Tight security of cascaded LRW2
- Building blockcipher from small-block tweakable blockcipher
- Full disk encryption: bridging theory and practice
- On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers
- On the optimality of non-linear computations for symmetric key primitives
- Tweaking Even-Mansour ciphers
- On-line ciphers and the Hash-CBC constructions
- scientific article; zbMATH DE number 1842498 (Why is no real title available?)
- Tweaking key-alternating Feistel block ciphers
- Revisiting construction of online cipher in hash-ECB-hash structure
- Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher
- Parallelizable and authenticated online ciphers
- Selected Areas in Cryptography
- Minimizing the two-round tweakable Even-Mansour cipher
- Building blockcipher from tweakable blockcipher: extending FSE 2009 proposal
This page was built for publication: Online ciphers from tweakable blockciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3073710)