π-Cipher: Authenticated Encryption for Big Data
暂无分享,去创建一个
Mohamed El-Hadedy | Danilo Gligoroski | Rune Erlend Jensen | Simona Samardjiska | Håkon Jacobsen | Hristina Mihajloska
[1] Gaëtan Leurent. Tag Second-preimage Attack against π-cipher , 2014 .
[2] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[3] Nigel P. Smart,et al. Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings , 2008, EUROCRYPT.
[4] Russ Housley,et al. Counter with CBC-MAC (CCM) , 2003, RFC.
[5] Guido Bertoni,et al. Duplexing the sponge: single-pass authenticated encryption and other applications , 2011, IACR Cryptol. ePrint Arch..
[6] Matthias Hauswirth,et al. Producing wrong data without doing anything obviously wrong! , 2009, ASPLOS.
[7] David A. Wagner,et al. A Generalized Birthday Problem , 2002, CRYPTO.
[8] Shay Gueron,et al. Intel's New AES Instructions for Enhanced Performance and Security , 2009, FSE.
[9] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[10] Mihir Bellare,et al. OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.
[11] Moti Yung,et al. Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.
[12] D. McGrew,et al. The Galois/Counter Mode of Operation (GCM) , 2005 .
[13] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[14] Guido Bertoni,et al. On the Indifferentiability of the Sponge Construction , 2008, EUROCRYPT.
[15] Josef Pieprzyk,et al. Parallel authenticated encryption with the duplex construction , 2013, IACR Cryptol. ePrint Arch..
[16] Mohamed El-Hadedy,et al. Cryptographic hash function Edon-R′ , 2009, 2009 Proceedings of the 1st International Workshop on Security and Communication Networks.
[17] Charanjit S. Jutla,et al. Encryption Modes with Almost Free Message Integrity , 2001, Journal of Cryptology.
[18] Mihir Bellare,et al. EAX: A Conventional Authenticated-Encryption Mode , 2003, IACR Cryptol. ePrint Arch..
[19] Mihir Bellare,et al. XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.