The Emergence of Authenticated Encryption

被引:0
|
作者
Rogaway, Phillip [1 ]
机构
[1] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
关键词
Authenticated encryption; modes of operation; practice-oriented; provable security; symmetric encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页数:1
相关论文
共 50 条
  • [41] Authenticated Encryption Schemes: A Systematic Review
    Jimale, Mohamud Ahmed
    Z'aba, Muhammad Reza
    Kiah, Miss Laiha Binti Mat
    Idris, Mohd Yamani Idna
    Jamil, Norziana
    Mohamad, Moesfa Soeheila
    Rohmad, Mohd Saufy
    [J]. IEEE ACCESS, 2022, 10 : 14739 - 14766
  • [42] Secure Fully Homomorphic Authenticated Encryption
    Kim, Jeongsu
    Yun, Aaram
    [J]. IEEE ACCESS, 2021, 9 : 107279 - 107297
  • [43] The Memory-Tightness of Authenticated Encryption
    Ghoshal, Ashrujit
    Jaeger, Joseph
    Tessaro, Stefano
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 : 127 - 156
  • [44] Improvement on a threshold authenticated encryption scheme
    Tan, Zuowen
    [J]. Journal of Software, 2010, 5 (07) : 697 - 704
  • [45] Research on the authenticated encryption technology in CCSDS
    Gong Chang-Qing
    Yang Ya-Hui
    [J]. 2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL I, 2010, : 189 - 192
  • [46] Hardware Trojan for an authenticated encryption Minalpher
    Dept. of Information Engineering, Graduate School of Meijo University, 1-501 Shiogamaguchi, Nagoya, Aichi, Japan
    不详
    [J]. IEEE Glob. Conf. Consum. Electron., GCCE, 2016,
  • [47] Biometric-Authenticated Searchable Encryption
    Gardham, Daniel
    Manulis, Mark
    Dragan, Constantin Catalin
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II, 2020, 12147 : 40 - 61
  • [48] Security of authenticated encryption scheme with message linkages
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
  • [49] Protecting FPGA Bitstreams Using Authenticated Encryption
    Abdellatif, Karim M.
    Chotin-Avot, R.
    Mehrez, H.
    [J]. 2013 IEEE 11TH INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2013,
  • [50] ELmE: A Misuse Resistant Parallel Authenticated Encryption
    Datta, Nilanjan
    Nandi, Mridul
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 306 - 321