<--- Back to Details
First PageDocument Content
Cryptography / Block cipher modes of operation / Message authentication codes / Finite fields / Block cipher / CBC-MAC / Keystream / One-key MAC / Block size / Galois/Counter Mode / XXTEA
Date: 2018-06-14 07:12:37
Cryptography
Block cipher modes of operation
Message authentication codes
Finite fields
Block cipher
CBC-MAC
Keystream
One-key MAC
Block size
Galois/Counter Mode
XXTEA

The Missing Difference Problem, and its Applications to Counter Mode Encryption? Ga¨etan Leurent and Ferdinand Sibleyras Inria, France {gaetan.leurent,ferdinand.sibleyras}@inria.fr

Add to Reading List

Source URL: who.rocq.inria.fr

Download Document from Source Website

File Size: 444,43 KB

Share Document on Facebook

Similar Documents

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007  Phillip Rogaway

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

DocID: 1pZbW - View Document

UNH_CMAC Version 2.1 The University of New Hampshire Implementation of the Cerebellar Model Arithmetic Computer - CMAC August 31, 1994 (last modified July, 1996) W. Thomas Miller and Filson H. Glanz

UNH_CMAC Version 2.1 The University of New Hampshire Implementation of the Cerebellar Model Arithmetic Computer - CMAC August 31, 1994 (last modified July, 1996) W. Thomas Miller and Filson H. Glanz

DocID: 1lnJo - View Document

One-key Double-Sum MAC with Beyond-Birthday Security Nilanjan Datta1 , Avijit Dutta1 , Mridul Nandi1 , Goutam Paul1 , Liting Zhang23 1  Indian Statistical Institute, Kolkata

One-key Double-Sum MAC with Beyond-Birthday Security Nilanjan Datta1 , Avijit Dutta1 , Mridul Nandi1 , Goutam Paul1 , Liting Zhang23 1 Indian Statistical Institute, Kolkata

DocID: 1kOXK - View Document

Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs ⋆ Keting Jia1 , Xiaoyun Wang 1  ⋆⋆1,2

Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs ⋆ Keting Jia1 , Xiaoyun Wang 1 ⋆⋆1,2

DocID: 12D1P - View Document

Below are seven separate sets of License Terms for Office for Mac 2011 and related software. Only one set of license terms in Sections 1 to 4 may apply to you; Sections 5-7 may not apply to you. You can view the License

Below are seven separate sets of License Terms for Office for Mac 2011 and related software. Only one set of license terms in Sections 1 to 4 may apply to you; Sections 5-7 may not apply to you. You can view the License

DocID: RuLM - View Document