Block Chaining Modes of Operation (2000)

by Lars R. Knudsen
Citations:7 - 1 self

Active Bibliography

NESSIE D13 - Security Evaluation of NESSIE First Phase – Bart Preneel, Sean Murphy, Juliette White, Gwenaelle Martinet, B. Preneel, Bart Van Rompay, Louis Granboulan, G. Martinet, S. Murphy, Rachel Shipsey, Eli Biham, Orr Dunkelman, J. White, Markus Dichtl, Jean-Jacques Quisquater, Pascale Serf, Markus Schafheutle, Håvard Raddum, E. Biham, O. Dunkelman, Vladimir Furman, Mathieu Ciet, J-j. Quisquater, Francesco Sica, Lars Knudsen, H. Raddum - 2001
Analysis of Camellia – Lars R. Knudsen - 2000
23 DEAL - A 128-bit Block Cipher – Lars Knudsen - 1998
Modes of Operation of a Block Cipher – B. Preneel
10 Recent Developments in the Design of Conventional Cryptographic Algorithms – Bart Preneel, Vincent Rijmen, Antoon Bosselaers - 1998
47 An Overview of Multimedia Content Protection in consumer electronics devices – Ahmet M. Eskicioglu, Edward J. Delp - 2001
14 On-Line Ciphers and the Hash-CBC constructions – M. Bellare, A. Boldyreva, L. Knudsen, C. Namprempre - 2001
4 On the Use of Encryption in Cryptographic Protocols – Wenbo Mao, Colin Boyd - 1995
91 How to protect DES against exhaustive key search – Joe Kilian, Phillip Rogaway - 1996
10 Stream ciphers – M. J. B. Robshaw - 1995
5 Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis – J. Lee, Howard M. Heys, S. E. Tavares - 1997
6 The Inverse S-box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers – Nicolas T. Courtois - 2005
9 Bit Permutation Instructions: Architecture, Implementation and Cryptographic Properties – Zhijie Jerry Shi - 2004
52 Unbalanced Feistel Networks and Block-Cipher Design – Bruce Schneier, John Kelsey - 1996
Dos and Don'ts of Client Authentication on the Web – Kevin Fu Emil - 2001
38 Dos and Don’ts of Client Authentication on the Web – Kevin Fu , Emil Sit, Kendra Smith, Nick Feamster - 2001
3 A Study on the Construction and Analysis of Substitution Boxes for Symmetric Cryptosystems – Kwangjo Kim, For Symmetric Cryptosystems - 1990
17 Open Questions, Talk Abstracts, and Summary of Discussions – Joan Feigenbaum, Michael Merritt - 1991
Summary – unknown authors