Cryptography in Theory and Practice: The Case of Encryption in IPsec
From MaRDI portal
Publication:3593086
DOI10.1007/11761679_2zbMATH Open1129.94034OpenAlexW1603589935MaRDI QIDQ3593086FDOQ3593086
Authors: Kenneth G. Paterson, Arnold K. L. Yau
Publication date: 24 September 2007
Published in: Advances in Cryptology - EUROCRYPT 2006 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11761679_2
Recommendations
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Title not available (Why is that?)
- Title not available (Why is that?)
- Breaking and provably repairing the SSH authenticated encryption scheme
- Advances in Cryptology - CRYPTO 2003
- Title not available (Why is that?)
Cited In (7)
- Privacy-preserving authenticated key exchange and the case of IKEv2
- A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
- ACE in chains: how risky is CBC encryption of binary executable files?
- Title not available (Why is that?)
- Title not available (Why is that?)
- On Hiding a Plaintext Length by Preencryption
- Practical realisation and elimination of an ECC-related software bug attack
This page was built for publication: Cryptography in Theory and Practice: The Case of Encryption in IPsec
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3593086)