Fast Software Encryption

From MaRDI portal
Publication:5902483


DOI10.1007/b93938zbMath1254.94033OpenAlexW2505253445WikidataQ56387660 ScholiaQ56387660MaRDI QIDQ5902483

Kaoru Kurosawa, Tetsu Iwata

Publication date: 5 January 2010

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b93938



Related Items

On tight quantum security of HMAC and NMAC in the quantum random oracle model, PMAC with Parity: Minimizing the Query-Length Influence, Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting, On modes of operations of a block cipher for authentication and authenticated encryption, Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes, Generalizing PMAC Under Weaker Assumptions, Revisiting structure graphs: applications to CBC-MAC and EMAC, CBCR: CBC MAC with rotating transformations, On optimal cryptographic key derivation, Attacks and Security Proofs of EAX-Prime, Authenticated encryption for very short inputs, Blockcipher-based authenticated encryption: how small can we go?, Non-adaptive Group-Testing Aggregate MAC Scheme, Authenticated Encryption Mode for Beyond the Birthday Bound Security, Trick or Tweak: On the (In)security of OTR’s Tweaks, TrCBC: another look at CBC-MAC, Key-reduced variants of 3Kf9 with beyond-birthday-bound security, Towards tight security bounds for \textsf{OMAC, XCBC} and \textsf{TMAC}, Quantum attacks against BBB secure PRFs or MACs built from public random permutations, Quantum linearization attacks, Fine-tuning the ISO/IEC standard \textsf{LightMAC}, \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher, On the Efficiency of ZMAC-Type Modes, On the Unprovable Security of 2-Key XCBC, Quantum attacks on beyond-birthday-bound MACs, On the security of keyed hashing based on public permutations, Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security, Improved security analysis for nonce-based enhanced hash-then-mask MACs, On Efficient Message Authentication Via Block Cipher Design Techniques, Об одном семействе универсальных функций хеширования, On the optimality of non-linear computations for symmetric key primitives, Notions and relations for RKA-secure permutation and function families, A Provable-Security Treatment of the Key-Wrap Problem, Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms, Cryptanalysis of OCB2: attacks on authenticity and confidentiality, Order-Preserving Symmetric Encryption, One-Key Compression Function Based MAC with Security Beyond Birthday Bound, Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch, Tight security bounds for double-block hash-then-sum MACs, Authenticated encryption: relations among notions and analysis of the generic composition paradigm, PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers, Breaking Symmetric Cryptosystems Using Quantum Period Finding, On the security of \textsf{TrCBC}, Security Notions for Disk Encryption, Collision-resistant and pseudorandom function based on Merkle-Damgård hash function, Some properties of the DEC mode of operation of block ciphers


Uses Software