Date: 2007-08-20 03:23:28Cryptography Authenticated encryption Symmetric-key cryptography Initialization vector Block cipher mode of operation Semantic security Pseudorandom function family Key Wrap Advantage Chosen-plaintext attack Probabilistic encryption Ciphertext indistinguishability | | An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-EnAdd to Reading ListSource URL: web.cs.ucdavis.eduDownload Document from Source Website File Size: 429,61 KBShare Document on Facebook
|