![Block cipher / Ciphertext / Cipher / Semantic security / RSA / Stream cipher / Ciphertext stealing / Blum–Goldwasser cryptosystem / Cryptography / Authenticated encryption / Initialization vector Block cipher / Ciphertext / Cipher / Semantic security / RSA / Stream cipher / Ciphertext stealing / Blum–Goldwasser cryptosystem / Cryptography / Authenticated encryption / Initialization vector](https://www.pdfsearch.io/img/ed4a3f954094c272fc24518da46b3394.jpg) Date: 2015-04-21 05:49:18Block cipher Ciphertext Cipher Semantic security RSA Stream cipher Ciphertext stealing Blum–Goldwasser cryptosystem Cryptography Authenticated encryption Initialization vector | | A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), IAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source Website File Size: 806,30 KBShare Document on Facebook
|