1![AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand](https://www.pdfsearch.io/img/94fd1ba69577de1927020bc2276f659e.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2015-02-21 21:04:37
|
---|
2![Broadcast Federation: An Application-layer Broadcast Internetwork Yatin Chawathe Mukund Seshadri Broadcast Federation: An Application-layer Broadcast Internetwork Yatin Chawathe Mukund Seshadri](https://www.pdfsearch.io/img/08074c6a654fd91e57ae21f72b8d5977.jpg) | Add to Reading ListSource URL: sahara.cs.berkeley.eduLanguage: English - Date: 2002-04-10 14:33:51
|
---|
3![Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology, Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,](https://www.pdfsearch.io/img/70beba719eef62b75151421bc67ee201.jpg) | Add to Reading ListSource URL: cs.tau.ac.ilLanguage: English - Date: 2009-06-25 15:56:23
|
---|
4![An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En](https://www.pdfsearch.io/img/9c4674acfbf90a35abd5f496e03dbdd1.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2007-08-20 03:23:28
|
---|
5![Appears in Advances in Cryptology – Eurocrypt ’02, Lecture Notes in Computer Science, Vol. ????, L. Knudsen, ed., Springer-Verlag. This is the full version. A Block-Cipher Mode of Operation for Parallelizable Message Appears in Advances in Cryptology – Eurocrypt ’02, Lecture Notes in Computer Science, Vol. ????, L. Knudsen, ed., Springer-Verlag. This is the full version. A Block-Cipher Mode of Operation for Parallelizable Message](https://www.pdfsearch.io/img/4ea969bacc2b951ca7325dd43d03be3e.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2002-02-15 21:53:00
|
---|
6![An abridged version, reference [2], appears as Advances in Cryptology – CRYPTO ’02, Lecture Notes in Computer Science, Vol. ????, M. Yung, ed., Springer-Verlag. This is the full version. Black-Box Analysis of the Blo An abridged version, reference [2], appears as Advances in Cryptology – CRYPTO ’02, Lecture Notes in Computer Science, Vol. ????, M. Yung, ed., Springer-Verlag. This is the full version. Black-Box Analysis of the Blo](https://www.pdfsearch.io/img/5285a6e35a73220737f3ca8fba77813b.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2002-06-04 14:04:18
|
---|
7![A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University](https://www.pdfsearch.io/img/122e9c3ad6e61f035d03e1c1e7396677.jpg) | Add to Reading ListSource URL: www.cs.fsu.eduLanguage: English - Date: 2010-12-02 09:59:21
|
---|
8![Browser Enhancements Against Phishing Attacks Rohin Dabas Adrian Perrig Dawn Song Browser Enhancements Against Phishing Attacks Rohin Dabas Adrian Perrig Dawn Song](https://www.pdfsearch.io/img/e90873179abd29896d3b2ee33dd3196a.jpg) | Add to Reading ListSource URL: cups.cs.cmu.eduLanguage: English - Date: 2005-07-08 22:36:51
|
---|
9![On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge](https://www.pdfsearch.io/img/77e396a0755e4b026d956dea52fa4a0a.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2010-12-10 03:09:04
|
---|
10![On the Role of Definitions in and Beyond Cryptography Phillip Rogaway Dept. of Computer Science, University of California, Davis, California 95616, USA, and Dept. of Computer Science, Fac. of Science, Chiang Mai Universi On the Role of Definitions in and Beyond Cryptography Phillip Rogaway Dept. of Computer Science, University of California, Davis, California 95616, USA, and Dept. of Computer Science, Fac. of Science, Chiang Mai Universi](https://www.pdfsearch.io/img/972d6db3dd730f9a78e8c69f02273e11.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2005-06-19 20:47:33
|
---|