Back to Results
First PageMeta Content
Semantic security / Block cipher modes of operation / Advantage / Key Wrap / Cipher / Probabilistic encryption / Optimal asymmetric encryption padding / Cryptography / Authenticated encryption / Initialization vector


An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En
Add to Reading List

Document Date: 2012-12-05 15:59:46


Open Document

File Size: 1,30 MB

Share Result on Facebook

City

Davis / ONVENTIONAL IV / /

Company

IBM / AES / CBC / Pr AG / probabilistic AE / Operation 11 7 Misuse-Resistant AE / /

Country

Thailand / United States / /

Facility

Portland State University / D Building / Chiang Mai University / University of California at Davis / /

IndustryTerm

deterministic algorithms / Network security protocols / personal communications / immediate solution / decryption algorithms / forward and reverse algorithms / decryption algorithm / encryption algorithm / /

Organization

Faculty of Science / Chiang Mai University / University of California / Portland State University / Portland / Department of Computer Science / /

Product

S2V / Pseudorandom injection / /

ProvinceOrState

Oregon / California / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

encryption / X9.102 algorithms / S/MIME / defines encryption / cryptography / RAM / IV-based authenticated-encryption / 1 DAE PRI MRAE SIV S2V PTE Deterministic authenticated-encryption / goal deterministic authenticated-encryption / encryption algorithm / Deterministic Authenticated-Encryption / Network security protocols / forward and reverse algorithms / misuse-resistant encryption / decryption algorithm / decryption algorithms / four algorithms / /

SocialTag