Parallelizable Encryption Mode with Almost Free Message Integrity (2000)

by Charanjit Jutla
Citations:106 - 3 self

Documents Related by Co-Citation

59 Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes – Virgil D. Gligor, Pompiliu Donescu - 2001
351 A Concrete Security Treatment of Symmetric Encryption – M. Bellare, A. Desai, E. Jokipii, P. Rogaway - 1997
136 OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption – Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz - 2001
222 Authenticated encryption: Relations among notions and analysis of the generic composition paradigm – Mihir Bellare, Chanathip Namprempre - 2000
193 The Security of the Cipher Block Chaining Message Authentication Code – Mihir Bellare, Joe Kilian , Phillip Rogaway - 2000
1172 Probabilistic encryption – S Goldwasser, S Micali - 1984
447 Relations among notions of security for public-key encryption schemes – Mihir Bellare, David Pointcheval, Phillip Rogaway - 1998
62 Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography – Mihir Bellare, Phillip Rogaway
123 The order of encryption and authentication for protecting communications (or: how Secure is SSL?) – Hugo Krawczyk - 2001
58 A Block-Cipher Mode of Operation for Parallelizable Message Authentication – John Black, Phillip Rogaway - 2002
447 Non-Malleable Cryptography – Danny Dolev, Cynthia Dwork, Moni Naor - 2000
16 Does Encryption with Redundancy Provide Authenticity? – Jee Hea An, Mihir Bellare - 2001
261 Analysis of key-exchange protocols and their use for building secure channels – Ran Canetti, Hugo Krawczyk - 2001
119 LFSR-based hashing and authentication – H Krawczyk - 1994
476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
53 The EAX mode of operation – M Bellare, P Rogaway, D Wagner
65 CBC MACs for arbitrary-length messages: The three-key constructions – John Black, Phillip Rogaway - 2000
37 Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation – Jonathan Katz, Moti Yung - 1978
237 Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS1 – Daniel Bleichenbacher - 1998