On modes of operation
From MaRDI portal
Publication:4499401
DOI10.1007/3-540-58108-1_14zbMATH Open0943.94530OpenAlexW1543000607MaRDI QIDQ4499401FDOQ4499401
Authors: Eli Biham
Publication date: 30 August 2000
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-58108-1_14
Recommendations
Cited In (10)
- Cryptanalysis of the ANSI X9. 52 CBCM Mode
- Optimized Self-Synchronizing Mode of Operation
- NIST block cipher modes of operation for authentication and combined confidentiality and authentication
- Cryptanalysis of some recently-proposed multiple modes of operation
- Some properties of the DEC mode of operation of block ciphers
- Incremental Unforgeable Encryption
- Title not available (Why is that?)
- The security of ``one-block-to-many modes of operation.
- How much data may be safely processed on one key in different modes?
- Title not available (Why is that?)
This page was built for publication: On modes of operation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4499401)