Block Chaining Modes of Operation (2000)

by Lars R. Knudsen
Citations:7 - 1 self

Documents Related by Co-Citation

361 A Concrete Security Treatment of Symmetric Encryption – M. Bellare, A. Desai, E. Jokipii, P. Rogaway - 1997
225 Authenticated encryption: Relations among notions and analysis of the generic composition paradigm – Mihir Bellare, Chanathip Namprempre - 2000
643 How t o construct random func- tions – O Goldreich, S Goldwasser, S Micali - 1984
802 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
1200 Probabilistic Encryption – S Goldwasser, S Micali - 1984
529 Finite Fields – R Lidl, H Niederreiter - 1983
1360 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
454 Non-Malleable Cryptography – Danny Dolev, Cynthia Dwork, Moni Naor - 2000
391 FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment – Atul Adya, William J. Bolosky, Miguel Castro, Gerald Cermak, Ronnie Chaiken, John R. Douceur, Jon, Jon Howell, Jacob R. Lorch, Marvin Theimer, Roger P. Wattenhofer - 2002