Cryptography in Theory and Practice: The Case of Encryption in IPsec
From MaRDI portal
Publication:3593086
Recommendations
Cites work
- scientific article; zbMATH DE number 1583788 (Why is no real title available?)
- scientific article; zbMATH DE number 1583804 (Why is no real title available?)
- scientific article; zbMATH DE number 1759277 (Why is no real title available?)
- scientific article; zbMATH DE number 2086729 (Why is no real title available?)
- scientific article; zbMATH DE number 1842499 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - EUROCRYPT 2004
- Breaking and provably repairing the SSH authenticated encryption scheme
Cited in
(7)- Privacy-preserving authenticated key exchange and the case of IKEv2
- A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
- ACE in chains: how risky is CBC encryption of binary executable files?
- scientific article; zbMATH DE number 1980957 (Why is no real title available?)
- scientific article; zbMATH DE number 1843160 (Why is no real title available?)
- On Hiding a Plaintext Length by Preencryption
- Practical realisation and elimination of an ECC-related software bug attack
This page was built for publication: Cryptography in Theory and Practice: The Case of Encryption in IPsec
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3593086)