Download Links

by Elizabeth A. Crump
Citations:1 - 0 self

Active Bibliography

2 On Tweaking Luby-Rackoff Blockciphers – David Goldenberg, Susan Hohenberger, Moses Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu - 2007
Tweakable Blockciphers, Revisited – Anonymized For Submission - 2009
4 Tweakable Enciphering Schemes Using Only the Encryption Function of a Block Cipher – Palash Sarkar
A Synopsis of Format-Preserving Encryption – Phillip Rogaway - 2010
Tweakable Blockciphers with Beyond Birthday-Bound Security – Will L, Thomas Shrimpton, R. Seth Terashima
1 Tweakable Enciphering Schemes From Stream Ciphers With IV – Palash Sarkar
3 Encrypted Watermarks and Linux Laptop Security – Markku-juhani O. Saarinen - 2004
1 Ciphers that Securely Encipher their own Keys – Mihir Bellare, David Cash, Sriram Keelveedhi - 2011
1 Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results – Gilles Piret, Jean-jacques Quisquater
66 A tweakable enciphering mode – Shai Halevi, Phillip Rogaway - 2003
1 Statistical Testing for Disk Encryption Modes of Operations – Mohamed Abo El-fotouh, Klaus Diepold
A Novel Disk Encompression with Tweaked Code Book (DETCB) – Debasis Gountia, Anil Kumar Swain - 2011
Protecting Drive Encryption Systems Against Memory Attacks – Leo Dorrendorf - 2011
4 Linear cryptanalysis of substitution-permutation networks – Liam Keliher - 2003
6 Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher – Palash Sarkar
1 New Tools in Cryptography: Mutually Indepent Commitments, Tweakable Block Ciphers, and Plaintext Awareness via Key Registration – Silvio M. Micali - 2004
A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation – Mridul Nandi
1 Improving upon HCTR and matching attacks for Hash-Counter-Hash approach – Mridul Nandi
1 F-HASH: Securing Hash Functions Using Feistel Chaining”, Cryptology ePrint Archive – Duo Lei