The Galois/Counter Mode of Operation (GCM)
暂无分享,去创建一个
[1] M.E. Hellman,et al. Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.
[2] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[3] David Chaum,et al. Advances in Cryptology: Proceedings Of Crypto 83 , 2012 .
[4] G. E. Thyer,et al. Modes of operation , 1991 .
[5] Mihir Bellare,et al. Incremental Cryptography: The Case of Hashing and Signing , 1994, CRYPTO.
[6] Mihir Bellare,et al. XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.
[7] Keshab K. Parhi,et al. Efficient finite field serial/parallel multiplication , 1996, Proceedings of International Conference on Application Specific Systems, Architectures and Processors: ASAP '96.
[8] Victor Shoup,et al. On Fast and Provably Secure Message Authentication Based on Universal Hashing , 1996, CRYPTO.
[9] Mihir Bellare,et al. A concrete security treatment of symmet-ric encryption: Analysis of the DES modes of operation , 1997, FOCS 1997.
[10] Gadiel Seroussi,et al. Table of low-weight binary irreducible polynomials , 1998 .
[11] Christof Paar,et al. Implementation Options for Finite Field Arithmetic for Elliptic Curve Cryptosystems , 1999 .
[12] Christof Paar,et al. A super-serial Galois fields multiplier for FPGAs and its application to public-key algorithms , 1999, Seventh Annual IEEE Symposium on Field-Programmable Custom Computing Machines (Cat. No.PR00375).
[13] Mihir Bellare,et al. The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..
[14] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[15] Mihir Bellare,et al. OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.
[16] Hugo Krawczyk,et al. The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) , 2001, CRYPTO.
[17] Morris J. Dworkin,et al. SP 800-38A 2001 edition. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[18] Tadayoshi Kohno,et al. The CWC-AES Dual-Use Mode , 2003 .
[19] Mihir Bellare,et al. EAX: A Conventional Authenticated-Encryption Mode , 2003, IACR Cryptol. ePrint Arch..
[20] D. Wagner,et al. A Conventional Authenticated-Encryption Mode , 2003 .
[21] Russ Housley,et al. Counter with CBC-MAC (CCM) , 2003, RFC.
[22] John Viega,et al. The Security and Performance of the Galois/Counter Mode (GCM) of Operation , 2004, INDOCRYPT.