Fast Software Encryption

From MaRDI portal
Publication:5713917

DOI10.1007/b98177zbMath1079.68559OpenAlexW2485295499MaRDI QIDQ5713917

Phillip Rogaway

Publication date: 27 December 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b98177




Related Items (42)

Algorithmic problems in the symbolic approach to the verification of automatically synthesized cryptosystemsHidden shift quantum cryptanalysis and implicationsOptimizing Online Permutation-Based AE Schemes for Lightweight ApplicationsRogue Decryption Failures: Reconciling AE Robustness NotionsSecurity of public key encryption against resetting attacksHiding in plain sight: memory-tight proofs via randomness programmingAttacks and Security Proofs of EAX-PrimeOn Symmetric Encryption with Distinguishable Decryption FailuresCryptanalysis of the AEAD and hash algorithm DryGASCONA practical forgery attack on Lilliput-AEIntegrity Analysis of Authenticated Encryption Based on Stream CiphersHow to backdoor (classic) McEliece and how to guard against backdoorsAuthenticated Encryption Mode for Beyond the Birthday Bound SecurityО стойкости режима аутентифицированного шифрования с дополнительными данными MGM к угрозе нарушения конфиденциальности;On the security of authenticated encryption mode with associated data MGM with respect to confidentiality threatAuthenticated Encryption with Variable StretchOn the related-key attack security of authenticated encryption schemesAuthenticated encryption with key identificationOverloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channelsAnonymous whistleblowing over authenticated channelsParaDiSE: efficient threshold authenticated encryption in fully malicious modelFull Disk Encryption: Bridging Theory and PracticeRevisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated EncryptionSimulatable channels: extended security that is universally composable and easier to proveUnnamed ItemRIV for Robust Authenticated EncryptionGrey-Box SteganographyModes of operations for encryption and authentication using stream ciphers supporting an initialisation vectorA Provable-Security Treatment of the Key-Wrap ProblemNonce-Based Key Agreement Protocol Against Bad RandomnessA New Mode of Operation for Incremental Authenticated Encryption with Associated DataThe \texttt{Deoxys} AEAD familyCryptanalysis of OCB2: attacks on authenticity and confidentialityPractical significance of security bounds for standardized internally re-keyed block cipher modesHow much data may be safely processed on one key in different modes?The Counter mode with encrypted nonces and its extension to authenticated encryptionEfficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal StretchAuthenticated Encryption with Small Stretch (or, How to Accelerate AERO)PolyE+CTR: A Swiss-Army-Knife Mode for Block CiphersCryptanalysis of the Light-Weight Cipher A2U2Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersThe memory-tightness of authenticated encryptionAnalyzing the provable security bounds of GIFT-COFB and Photon-Beetle




This page was built for publication: Fast Software Encryption