A Software-Optimized Encryption Algorithm (1997)

by Phillip Rogaway , Don Coppersmith
Citations:56 - 0 self

Active Bibliography

Cryptologic Research A Software-Optimized Encryption Algorithm∗ – Phillip Rogaway - 1996
770 SPINS: Security Protocols for Sensor Networks – Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar - 2001
483 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
490 Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks – Yih-chun Hu - 2003
1Recent Developments in the Design of Conventional Cryptographic Algorithms – Bart Preneel, Vincent Rijmen, Antoon Bosselaers
731 Differential Power Analysis – Paul Kocher, Joshua Jaffe, Benjamin Jun - 1999
802 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
1718 A Theory of the Learnable – L. G. Valiant - 1984
838 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995