On the Construction of Variable-Input-Length Ciphers (1998)

by Mihir Bellare , Giovanni Di Crescenzo , Phillip Rogaway
Venue:In Fast Software Encryption
Citations:15 - 4 self

Active Bibliography

22 Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible – Mihir Bellare, Ted Krovetz, Phillip Rogaway - 1998
5 Luby-Racko backwards: Increasing security by making block ciphers non-invertible – Mihir Bellare, Ted Krovetz - 1998
10 Towards Making Luby-Rackoff Ciphers Optimal and Practical – Sarvar Patel, Zulfikar Ramzan, Ganesh Sundaram, Ganapathy S. Sundaram - 1999
4 Statistical Cryptanalysis of Block Ciphers – Pascal Junod - 2004
17 Building PRFs from PRPs – Chris Hall, David Wagner, John Kelsey, Bruce Schneier - 1998
5 Towards making Luby-Racko ciphers optimal and practical – Sarvar Patel, Ganapathy S. Sundaram - 1999
1 Sha-zam: A Block Cipher. Fast as DES, Secure as SHA – As Sha, Sarvar Patel, Zulfikar Ramzan, Ganesh Sundaram - 1999
24 Exposure-Resilient Cryptography – Yevgeniy Dodis, Yevgeniy Dodis - 2000
13 Pseudorandom function tribe ensembles based on one-way permutations: Improvements and applications – Marc Fischlin - 1999
62 Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography – Mihir Bellare, Phillip Rogaway
1 Benes and Butterfly schemes revisited – Jacques Patarin, Audrey Montreuil - 2005
ManTiCore: Encryption with Joint Cipher-State Authentication – Cheryl Beaver Timothy, Timothy Draelos, Mark Torgerson - 2003
33 Ciphers with Arbitrary Finite Domains – John Black, Phillip Rogaway - 2002
9 The Sum of PRPs is a Secure PRF – Stefan Lucks, Theoretische Informatik, Universit├Ąt Mannheim - 2000
A Synopsis of Format-Preserving Encryption – Phillip Rogaway - 2010
10 Recent Developments in the Design of Conventional Cryptographic Algorithms – Bart Preneel, Vincent Rijmen, Antoon Bosselaers - 1998
66 A tweakable enciphering mode – Shai Halevi, Phillip Rogaway - 2003
7 Computationally Secure Information Flow – Peeter Laud - 2002
28 A Formal Treatment of Remotely Keyed Encryption – Matt Blaze, Joan Feigenbaum, Moni Naor - 1998