Fast Software Encryption
From MaRDI portal
Publication:5902496
DOI10.1007/b93938zbMath1254.68115OpenAlexW2505253445WikidataQ56387660 ScholiaQ56387660MaRDI QIDQ5902496
Doug Whiting, John Kelsey, Stefan Lucks, Niels Ferguson, Bruce Schneier, Tadayoshi Kohno
Publication date: 5 January 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b93938
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items
Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications, ASC-1: An Authenticated Encryption Stream Cipher, Related-Key Attacks Against Full Hummingbird-2, Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers, The Software Performance of Authenticated-Encryption Modes, Cryptanalysis of Hummingbird-1, Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector, Near birthday attack on “$8$ bits” $\mathsf{AEAD}$ mode, Authenticated encryption: relations among notions and analysis of the generic composition paradigm