Authenticated-encryption with associated-data
暂无分享,去创建一个
[1] Russ Housley,et al. Counter with CBC-MAC (CCM) , 2003, RFC.
[2] Virgil D. Gligor,et al. Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes , 2001, FSE.
[3] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[4] Mihir Bellare,et al. OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.
[5] Benny Pinkas,et al. Securely combining public-key cryptosystems , 2001, CCS '01.
[6] Mihir Bellare,et al. Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography , 2000, ASIACRYPT.
[7] Jakob Jonsson,et al. On the Security of CTR + CBC-MAC , 2002, Selected Areas in Cryptography.
[8] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[9] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[10] John Black,et al. A Block-Cipher Mode of Operation for Parallelizable Message Authentication , 2002, EUROCRYPT.
[11] Philip Hawkes,et al. A Mode of Operation with Partial Encryption and Message Integrity , 2003, IACR Cryptol. ePrint Arch..
[12] Jonathan Katz,et al. Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation , 2000, FSE.
[13] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[14] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[15] Mihir Bellare,et al. The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..
[16] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[17] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[18] Mihir Bellare,et al. A concrete security treatment of symmet-ric encryption: Analysis of the DES modes of operation , 1997, FOCS 1997.
[19] Charanjit S. Jutla. Encryption Modes with Almost Free Message Integrity , 2001, EUROCRYPT.
[20] Hugo Krawczyk,et al. LFSR-based Hashing and Authentication , 1994, CRYPTO.
[21] Jean-Sébastien Coron,et al. Universal Padding Schemes for RSA , 2002, CRYPTO.
[22] David J. Goodman,et al. Personal Communications , 1994, Mobile Communications.