The Emergence of Authenticated Encryption

被引:0
|
作者
Rogaway, Phillip [1 ]
机构
[1] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
关键词
Authenticated encryption; modes of operation; practice-oriented; provable security; symmetric encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页数:1
相关论文
共 50 条
  • [31] Breaking the IOC Authenticated Encryption Mode
    Bottinelli, Paul
    Reyhanitabar, Reza
    Vaudenay, Serge
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 126 - 135
  • [32] Concealment and its applications to authenticated encryption
    Dodis, Y
    An, JH
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 312 - 329
  • [33] Efficient Schemes for Committing Authenticated Encryption
    Bellare, Mihir
    Hoang, Viet Tung
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 845 - 875
  • [34] AEGIS: A Fast Authenticated Encryption Algorithm
    Wu, Hongjun
    Preneel, Bart
    [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 185 - 201
  • [35] Cryptanalysis of publicly verifiable authenticated encryption
    Chang, TY
    Yang, CC
    Hwang, MS
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (06) : 1645 - 1646
  • [36] Lower bound on linear authenticated encryption
    Jutla, CS
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2004, 3006 : 348 - 360
  • [37] Broadcast Authenticated Encryption with Keyword Search
    Liu, Xueqiao
    He, Kai
    Yang, Guomin
    Susilo, Willy
    Tonien, Joseph
    Huang, Qiong
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 193 - 213
  • [38] DLP SPONGE CONSTRUCTION FOR AUTHENTICATED ENCRYPTION
    Hammad, Baraa Tariq
    Jamil, Norziana
    Rusli, Mohd Ezanee
    Zaba, Muhammad Reza
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS: EMBRACING ECO-FRIENDLY COMPUTING, 2017, : 714 - 721
  • [39] On the security of two authenticated encryption schemes
    Zhang, Jianhong
    Ji, Cheng
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1315 - 1319
  • [40] Key Assignment Scheme with Authenticated Encryption
    Kandele, Suyash
    Paul, Souradyuti
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (04) : 150 - 196