<--- Back to Details
First PageDocument Content
Block cipher / Ciphertext / Cipher / Semantic security / RSA / Stream cipher / Ciphertext stealing / Blum–Goldwasser cryptosystem / Cryptography / Authenticated encryption / Initialization vector
Date: 2015-04-21 05:49:18
Block cipher
Ciphertext
Cipher
Semantic security
RSA
Stream cipher
Ciphertext stealing
Blum–Goldwasser cryptosystem
Cryptography
Authenticated encryption
Initialization vector

A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), I

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 806,30 KB

Share Document on Facebook

Similar Documents

Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis? and John C. Mitchell?? Abstract. A game-based cryptographic proof is a relation that establishes equivalence between probabilist

Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis? and John C. Mitchell?? Abstract. A game-based cryptographic proof is a relation that establishes equivalence between probabilist

DocID: 1xTmW - View Document

Semantic Interoperability Community of Practice (SICoP) Semantic Web Applications for National Security Conference Hyatt Regency Crystal City, Regency Ballrooms E and F Brand Niemann (US EPA) and Rick Morris (U.S. Army),

Semantic Interoperability Community of Practice (SICoP) Semantic Web Applications for National Security Conference Hyatt Regency Crystal City, Regency Ballrooms E and F Brand Niemann (US EPA) and Rick Morris (U.S. Army),

DocID: 1vrXg - View Document

2014 IEEE Symposium on Security and Privacy  SoK: Introspections on Trust and the Semantic Gap Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, and Radu Sion Stony Brook University {bpjain, mbaig, dozhang,

2014 IEEE Symposium on Security and Privacy SoK: Introspections on Trust and the Semantic Gap Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, and Radu Sion Stony Brook University {bpjain, mbaig, dozhang,

DocID: 1vkJQ - View Document

Intelligent Semantic Query (ISQ) NOTAMS Semantic Web Applications for National Security 7 April 2005 Edward DePalma

Intelligent Semantic Query (ISQ) NOTAMS Semantic Web Applications for National Security 7 April 2005 Edward DePalma

DocID: 1vjer - View Document

Presentation to the Semantic Web Applications for National Security (SWANS) Conference XG Communications Program Information Briefing Preston Marshall

Presentation to the Semantic Web Applications for National Security (SWANS) Conference XG Communications Program Information Briefing Preston Marshall

DocID: 1tQK3 - View Document