Practical symmetric on-line encryption (2003)

Cached

Download Links

by Pierre-alain Fouque , Gwenaëlle Martinet , Guillaume Poupard
Venue:In Lecture Notes in Computer Science. Advances in Cryptology— FSE’03
Citations:9 - 2 self

Documents Related by Co-Citation

7 Online Encryption Schemes: New Security Notions and Constructions – A Boldyreva, N Taesombut - 2004
14 Blockwise-Adaptive Attackers - Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC – Antoine Joux, Gwenaëlle Martinet, Frederic Valette - 2002
351 A Concrete Security Treatment of Symmetric Encryption – M. Bellare, A. Desai, E. Jokipii, P. Rogaway - 1997
5 Authenticated On-Line Encryption – Pierre-alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette
6 Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes – Pierre-alain Fouque, Antoine Joux, Guillaume Poupard - 2004
3 Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption – G V Bard - 2007
222 Authenticated encryption: Relations among notions and analysis of the generic composition paradigm – Mihir Bellare, Chanathip Namprempre - 2000
13 A Challenging But Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL – Gregory V. Bard - 2006
61 Characterization of Security Notions for Probabilistic Private-Key Encryption – Jonathan Katz, Moti Yung - 2006
148 How to Sign Digital Streams – Rosario Gennaro, Pankaj Rohatgi - 1997
19 Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm – Mihir Bellare - 2004
136 OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption – Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz - 2001
21 cryptography: A New Dimension in Data security,Iohn – c Meyer, S Matyas - 1982
29 Recommendation for Block Cipher Modes of Operation: Methods and Techniques – Morris Dworkin, Morris Dworkin, Patrick D. Gallagher, Director Nist Special Publication -f - 2001
39 Code-Based Game-Playing Proofs and the Security of Triple Encryption – Mihir Bellare, Phillip Rogaway - 2006
119 LFSR-based hashing and authentication – H Krawczyk - 1994
1172 Probabilistic encryption – S Goldwasser, S Micali - 1984
1 512 – 528 – M Bellare, R Canetti, H Krawczyk - 2001
122 XOR MACS: New Methods for Message Authentication using Finite Pseudorandom Functions – Mihir Bellare, Roch Guérin, Phillip Rogaway - 1995