swMATH20876MaRDI QIDQ32690FDOQ32690
Author name not available (Why is that?)
Official website: https://rd.springer.com/chapter/10.1007/978-3-642-34047-5_12
Cited In (32)
- Remus
- Nonce-misuse security of the SAEF authenticated encryption mode
- A new algorithm for the unbalanced meet-in-the-middle problem
- Romulus
- Blockcipher-based authenticated encryption: how small can we go?
- ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation
- Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption
- On modes of operations of a block cipher for authentication and authenticated encryption
- On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers
- Authenticated encryption with variable stretch
- Beyond conventional security in sponge-based authenticated encryption modes
- The \texttt{Deoxys} AEAD family
- Probably secure keyed-function based authenticated encryption schemes for big data
- AEGIS
- AESNI
- CBEAM
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- COBRA
- ELmD
- Skein Hash
- Word
- ELmE
- OleF
- POEx
- MMH
- Poly1305-AES
- ATHENa
- Revisiting construction of online cipher in hash-ECB-hash structure
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
- Minalpher
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher
- Optimizing Online Permutation-Based AE Schemes for Lightweight Applications
This page was built for software: McOE