How much data may be safely processed on one key in different modes?
From MaRDI portal
Publication:3383073
Recommendations
- Analysis of the GOST 28147-89 modes of operation that provide confidentiality
- On modes of operation
- The security of ``one-block-to-many modes of operation.
- On the properties of the CTR encryption mode of Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro key meshing
- Rigorous upper bounds on data complexities of block cipher cryptanalysis
Cites work
- scientific article; zbMATH DE number 3727274 (Why is no real title available?)
- scientific article; zbMATH DE number 1942410 (Why is no real title available?)
- scientific article; zbMATH DE number 1406792 (Why is no real title available?)
- Fast Software Encryption
- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers
- Optimized Self-Synchronizing Mode of Operation
- Probabilistic encryption
- Probability to meet in the middle
- Selected Areas in Cryptography
This page was built for publication: How much data may be safely processed on one key in different modes?
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3383073)