<--- Back to Details
First PageDocument Content
Cryptography / Initialization vector / Authenticated encryption / Stream cipher / Symmetric-key algorithm / Cipher / Chosen-plaintext attack / Advantage / Padding / Data Encryption Standard / Cryptographic nonce / Block cipher mode of operation
Date: 2015-04-26 02:21:29
Cryptography
Initialization vector
Authenticated encryption
Stream cipher
Symmetric-key algorithm
Cipher
Chosen-plaintext attack
Advantage
Padding
Data Encryption Standard
Cryptographic nonce
Block cipher mode of operation

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 768,00 KB

Share Document on Facebook

Similar Documents

Cryptography / Stream ciphers / Grain / Cube attack / Trivium / ESTREAM / Linear-feedback shift register / ARIA / Lookup table

Efficient FPGA implementations of high-dimensional cube testers on the stream cipher Grain-128 Jean-Philippe Aumasson Itai Dinur Luca Henzen Willi Meier Adi Shamir

DocID: 1xToj - View Document

Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

DocID: 1uEEQ - View Document

Cryptography / Advantage / Encryption / RSA / Cipher / Symmetric-key algorithm

Symmetric-Key Encryption: constructions Lecture 4 PRG, Stream Cipher

DocID: 1uwx4 - View Document

Sosemanuk, a fast software-oriented stream cipher∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T. Pornin7 and H. Sibert

DocID: 1uqni - View Document

On the Hardware Implementation of the MICKEY-128 Stream Cipher Paris Kitsos2 ABSTRACT Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure communication channels. MICKEY

DocID: 1sR8a - View Document