![SHA-1 / SHA-2 / Hash function / Block cipher modes of operation / Block cipher / Authenticated encryption / Ciphertext indistinguishability / One-way compression function / Index of cryptography articles / Cryptography / Error detection and correction / Cryptographic hash functions SHA-1 / SHA-2 / Hash function / Block cipher modes of operation / Block cipher / Authenticated encryption / Ciphertext indistinguishability / One-way compression function / Index of cryptography articles / Cryptography / Error detection and correction / Cryptographic hash functions](https://www.pdfsearch.io/img/d0d64c27857c5c670f10133eb71bc75e.jpg) Date: 2014-12-17 05:30:49SHA-1 SHA-2 Hash function Block cipher modes of operation Block cipher Authenticated encryption Ciphertext indistinguishability One-way compression function Index of cryptography articles Cryptography Error detection and correction Cryptographic hash functions | | COFFE: Ciphertext Output Feedback Faithful Encryption On-Line Authenticated Encryption Without a Block Cipher Christian Forler1⋆ , David McGrew2 , Stefan Lucks1 , and Jakob Wenzel1 1 Bauhaus-University Weimar, GermanyAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source Website File Size: 292,53 KBShare Document on Facebook
|