11![The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway](https://www.pdfsearch.io/img/896841aaa8151a181d4e7d22de5fbaa6.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2007-08-20 03:22:52
|
---|
12![A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA](https://www.pdfsearch.io/img/421d28920e0329cf65afae78078d0d82.jpg) | Add to Reading ListSource URL: cs-www.cs.yale.eduLanguage: English - Date: 2001-10-24 10:54:04
|
---|
13![Microsoft PowerPoint - ch5.ppt [相容模式] Microsoft PowerPoint - ch5.ppt [相容模式]](https://www.pdfsearch.io/img/ce25399442fcba161a6f35a8f560fb69.jpg) | Add to Reading ListSource URL: people.cs.nctu.edu.twLanguage: English - Date: 2012-08-25 21:38:28
|
---|
14![The proceedings version of this paper [15] appears in Advances in Cryptology — CRYPTO ’03, Lecture Notes in Computer Science, vol. 2729, D. Boneh, ed., Springer-Verlag, 2003. This is the full version. A Tweakable Enc The proceedings version of this paper [15] appears in Advances in Cryptology — CRYPTO ’03, Lecture Notes in Computer Science, vol. 2729, D. Boneh, ed., Springer-Verlag, 2003. This is the full version. A Tweakable Enc](https://www.pdfsearch.io/img/6aa967fd83e5d79ba5401797724009bc.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2003-08-29 18:48:22
|
---|
15![A preliminary version of this paper appears in Fast Software Encryption - FSE 2007, Lecture Notes in Computer Science Vol. ???, pp. ?-?, ??? eds., Springer-Verlag, 2007. This is the full version. How to Enrich the Messag A preliminary version of this paper appears in Fast Software Encryption - FSE 2007, Lecture Notes in Computer Science Vol. ???, pp. ?-?, ??? eds., Springer-Verlag, 2007. This is the full version. How to Enrich the Messag](https://www.pdfsearch.io/img/f192b9368d04201e0b96693d7bae05d1.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2007-03-26 17:44:21
|
---|
16![A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway† June 17, 2003 A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway† June 17, 2003](https://www.pdfsearch.io/img/db6b6e4e9b3aed5a8c0d5808c9e88e7e.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2003-08-29 18:48:29
|
---|
17![Modular Verification of Collaboration-Based Software Designs Kathi Fisler Shriram Krishnamurthi Modular Verification of Collaboration-Based Software Designs Kathi Fisler Shriram Krishnamurthi](https://www.pdfsearch.io/img/ba6b8c4083c9ee0a22dcb9bced80e1dc.jpg) | Add to Reading ListSource URL: web.cs.wpi.eduLanguage: English - Date: 2001-08-24 21:30:06
|
---|
18![The Serializability of Concurrent Database Updates CHRISTOS H. P A P A D I M I T R I O U Massachusetts Institute of Technology, Cambridge, Massachusetts ABSTRACT A sequence of interleaved user transactions in a database The Serializability of Concurrent Database Updates CHRISTOS H. P A P A D I M I T R I O U Massachusetts Institute of Technology, Cambridge, Massachusetts ABSTRACT A sequence of interleaved user transactions in a database](https://www.pdfsearch.io/img/84b4c3d95e56b7fdd78d58086b36f951.jpg) | Add to Reading ListSource URL: www.cs.purdue.eduLanguage: English - Date: 2005-06-06 23:45:48
|
---|
19![Francisco Rodriguez-Henriquez, Centro de Investigación y de Estudios Avanzados del IPN (CINVESTAV), Col. San Pedro Zacatenco, Mexico D.F., Mexico; Nazar Abbas Saqib, Centro de Investigación y de Estudios Avanzados del Francisco Rodriguez-Henriquez, Centro de Investigación y de Estudios Avanzados del IPN (CINVESTAV), Col. San Pedro Zacatenco, Mexico D.F., Mexico; Nazar Abbas Saqib, Centro de Investigación y de Estudios Avanzados del](https://www.pdfsearch.io/img/1053b7677402dc939b11791555fdba8d.jpg) | Add to Reading ListSource URL: delta.cs.cinvestav.mxLanguage: English - Date: 2007-02-03 23:20:56
|
---|
20![The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2 The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2](https://www.pdfsearch.io/img/f7de2d69be253a390f19166186a60de4.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2012-05-16 03:26:41
|
---|