Efficient beyond-birthday-bound secure authenticated encryption modes

被引:2
|
作者
Zhang, Ping [1 ,2 ]
Hu, Honggang [1 ,2 ]
Wang, Peng [3 ]
机构
[1] Univ Sci & Technol China, Sch Informat Sci & Technol, Hefei 230027, Anhui, Peoples R China
[2] Chinese Acad Sci, Key Lab Electromagnet Space Informat, Hefei 230027, Anhui, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
Acknowledgements This work was supported by National Natural Science Foundation of China (Grant Nos. 61522210; 61632013);
D O I
10.1007/s11432-017-9253-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
6
引用
收藏
页数:3
相关论文
共 50 条
  • [31] New blockcipher modes of operation with beyond the birthday bound security
    Iwata, Tetsu
    [J]. FAST SOFTWARE ENCRYPTION, 2006, 4047 : 310 - 327
  • [32] A generic method to design modes of operation beyond the birthday bound
    Lefranc, David
    Painchault, Philippe
    Rouat, Valerie
    Mayer, Emmanuel
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 328 - +
  • [33] A secure authenticated encryption scheme and its extension
    Zhang, Jianhong
    Cheng, Ji
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2007, : 74 - 78
  • [34] Unconditionally Secure Authenticated Encryption with Shorter Keys
    Alomair, Basel
    Poovendran, Radha
    [J]. SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2009, : 3 - 15
  • [35] Secure remote storage through authenticated encryption
    Hou, Fangyong
    Gu, Dawu
    Xiao, Nong
    Tang, Yuhua
    [J]. PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 3 - +
  • [36] TriviA: A Fast and Secure Authenticated Encryption Scheme
    Chakraborti, Avik
    Chattopadhyay, Anupam
    Hassan, Muhammad
    Nandi, Mridul
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 330 - 353
  • [37] Secure Disk with Authenticated Encryption and IV Verification
    Hou, Fangyong
    Xiao, Nong
    Liu, Fang
    He, Hongjun
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 41 - 44
  • [38] POEx: A beyond-birthday-bound-secure on-line cipher
    Christian Forler
    Eik List
    Stefan Lucks
    Jakob Wenzel
    [J]. Cryptography and Communications, 2018, 10 : 177 - 193
  • [39] POEX: A beyond-birthday-bound-secure on-line cipher
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (01): : 177 - 193
  • [40] A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
    Shehzad Ashraf Chaudhry
    Mohammad Sabzinejad Farash
    Husnain Naqvi
    Muhammad Sher
    [J]. Electronic Commerce Research, 2016, 16 : 113 - 139