<--- Back to Details
First PageDocument Content
Cryptography / Secure communication / Message authentication codes / Transport Layer Security / Cryptographic protocols / Internet Standards / Cipher suite / Authenticated encryption / Poly1305 / Galois/Counter Mode / OpenSSL / Key generation
Date: 2017-04-03 15:58:36
Cryptography
Secure communication
Message authentication codes
Transport Layer Security
Cryptographic protocols
Internet Standards
Cipher suite
Authenticated encryption
Poly1305
Galois/Counter Mode
OpenSSL
Key generation

Implementing and Proving the TLS 1.3 Record Layer Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin Microsoft Research {antdl,fournet

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 780,71 KB

Share Document on Facebook

Similar Documents

On the (Im)possibility of Blind Message Authentication Codes Michel Abdalla1 , Chanathip Namprempre2 , and Gregory Neven1,3 1  Departement d’Informatique

On the (Im)possibility of Blind Message Authentication Codes Michel Abdalla1 , Chanathip Namprempre2 , and Gregory Neven1,3 1 Departement d’Informatique

DocID: 1xUpG - View Document

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

DocID: 1qHZI - View Document

Appears in Advances in Cryptology – Eurocrypt ’02, Lecture Notes in Computer Science, Vol. ????, L. Knudsen, ed., Springer-Verlag. This is the full version. A Block-Cipher Mode of Operation for Parallelizable Message

Appears in Advances in Cryptology – Eurocrypt ’02, Lecture Notes in Computer Science, Vol. ????, L. Knudsen, ed., Springer-Verlag. This is the full version. A Block-Cipher Mode of Operation for Parallelizable Message

DocID: 1qvnb - View Document

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007  Phillip Rogaway

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

DocID: 1pZbW - View Document

Analysis of CAESAR candidates Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Analysis of CAESAR candidates Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

DocID: 1oJoZ - View Document