Back to Results
First PageMeta Content
Ciphertext indistinguishability / Public-key cryptography / Encryption / VMAC / Digital signature / Deterministic encryption / Advantage / Cipher / Galois/Counter Mode / Cryptography / Authenticated encryption / Message authentication code


Chapter 7 Message Authentication In most people’s minds, privacy is the goal most strongly associated to cryptography. But message authentication is arguably even more important. Indeed you may or may not care if some
Add to Reading List

Document Date: 2009-09-20 23:25:35


Open Document

File Size: 217,47 KB

Share Result on Facebook

Company

MACs / CBC / VF / /

Currency

USD / /

Event

Business Partnership / /

IndustryTerm

tag-verification algorithm / bank / higher-level protocols / deterministic encryption algorithm / decryption algorithm / potential solutions / deterministic algorithm / security systems / bank balance / encryption algorithm / tag-generation algorithm / communications media / /

Organization

Ai / A. / /

Person

Ai / /

Position

IND-CPA / system administrator / /

ProgrammingLanguage

K / T / /

Technology

encryption / deterministic encryption algorithm / one-time pad encryption / cryptography / MAC-generation algorithm / higher-level protocols / privacy-providing encryption / symmetric encryption / same MACing algorithm / One-time-pad encryption / encryption algorithm / ASCII / separate tag-verification algorithm / deterministic algorithm / tag-generation algorithm / tag-verification algorithm / secret key / decryption algorithm / /

SocialTag