First Page | Document Content | |
---|---|---|
Date: 2007-08-20 03:23:28Cryptography Authenticated encryption Symmetric-key cryptography Initialization vector Block cipher mode of operation Semantic security Pseudorandom function family Key Wrap Advantage Chosen-plaintext attack Probabilistic encryption Ciphertext indistinguishability | An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-EnAdd to Reading ListSource URL: web.cs.ucdavis.eduDownload Document from Source WebsiteFile Size: 429,61 KBShare Document on Facebook |
An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-EnDocID: 1qWnQ - View Document | |
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3DocID: 1qBQm - View Document | |
D:/Documents/Courses/Winter 2014/aez/rae.dviDocID: 1qyAn - View Document | |
Appears in Advances in Cryptology – Eurocrypt ’02, Lecture Notes in Computer Science, Vol. ????, L. Knudsen, ed., Springer-Verlag. This is the full version. A Block-Cipher Mode of Operation for Parallelizable MessageDocID: 1qvnb - View Document | |
X-Wall MX IntroductionDocID: 1qr0P - View Document |