<--- Back to Details
First PageDocument Content
Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability
Date: 2007-08-20 03:23:28
Cryptography
Authenticated encryption
Symmetric-key cryptography
Initialization vector
Block cipher mode of operation
Semantic security
Pseudorandom function family
Key Wrap
Advantage
Chosen-plaintext attack
Probabilistic encryption
Ciphertext indistinguishability

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: web.cs.ucdavis.edu

Download Document from Source Website

File Size: 429,61 KB

Share Document on Facebook

Similar Documents

A Provable-Security Treatment of the Key-Wrap Problem Phillip Rogaway1 and Thomas Shrimpton2 1 2

A Provable-Security Treatment of the Key-Wrap Problem Phillip Rogaway1 and Thomas Shrimpton2 1 2

DocID: 1ttqA - View Document

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

DocID: 1qWnQ - View Document

Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

DocID: 1q5Q3 - View Document

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007  Phillip Rogaway

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

DocID: 1pZbW - View Document

: Practical Cryptographic Systems  April 5, 2011 Midterm Instructor: Matthew Green

: Practical Cryptographic Systems April 5, 2011 Midterm Instructor: Matthew Green

DocID: 1pFqD - View Document