Practical symmetric on-line encryption (2003)

Cached

Download Links

by Pierre-alain Fouque , Gwenaëlle Martinet , Guillaume Poupard
Venue:In Lecture Notes in Computer Science. Advances in Cryptology— FSE’03
Citations:9 - 2 self

Active Bibliography

14 Blockwise-Adaptive Attackers - Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC – Antoine Joux, Gwenaëlle Martinet, Frederic Valette - 2002
New Blockcipher Modes of Operation with – Beyond The Birthday, Tetsu Iwata - 2006
2 On the Security of the CCM Encryption Mode and of a Slight Variant – Pierre-alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sébastien Zimmer
18 Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-Keying Techniques – Michel Abdalla, Mihir Bellare - 2000
22 Authenticated encryption in SSH: Provably fixing the SSH Binary Packet Protocol. Cryptology ePrint Archive, Report 2002/078 – Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre - 2002
The Associated-Data Problem (How to cheaply authenticate unencrypted data when using an authenticated-encryption scheme) – Phillip Rogaway - 2001
1 Proposal to NIST for a block-cipher mode of operation which simultaneously provides privacy and authenticity – Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz - 2001
7 On the Role of Definitions in and Beyond Cryptography – Phillip Rogaway - 2004
6 Provably Fixing the SSH Binary Packet Protocol – Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre - 2002
3 Proposal to NIST for a parallelizable message authentication code – Phillip Rogaway, John Black - 2001
123 The order of encryption and authentication for protecting communications (or: how Secure is SSL?) – Hugo Krawczyk - 2001
40 Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC – Phillip Rogaway - 2003
19 Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm – Mihir Bellare - 2004
136 OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption – Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz - 2001
222 Authenticated encryption: Relations among notions and analysis of the generic composition paradigm – Mihir Bellare, Chanathip Namprempre - 2000
33 Authenticated-encryption with associated-data – Phillip Rogaway - 2002
724 SPINS: Security Protocols for Sensor Networks – Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar - 2001
1 ShortPK: A Short-Term Public Key Scheme for Broadcast Authentication in Sensor Networks – Ronghua Wang, Wenliang Du, Xiaogang Liu, Peng Ning
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-Keying Techniques – Mihir Bellarey - 2001