Tweakable Enciphering Schemes From Stream Ciphers With IV
暂无分享,去创建一个
[1] David A. Wagner,et al. Tweakable Block Ciphers , 2002, CRYPTO.
[2] Palash Sarkar,et al. Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions , 2009, IEEE Transactions on Information Theory.
[3] Palash Sarkar,et al. HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach , 2006, INDOCRYPT.
[4] Palash Sarkar,et al. A General Construction of Tweakable Block Ciphers and Different Modes of Operations , 2008, IEEE Transactions on Information Theory.
[5] Toshiyasu Matsushima,et al. Tweakable Enciphering Schemes from Hash-Sum-Expansion , 2007, INDOCRYPT.
[6] Henri Gilbert,et al. On the Security of IV Dependent Stream Ciphers , 2007, FSE.
[7] Kaoru Kurosawa,et al. How to Construct Super-Pseudorandom Permutations with Short Keys , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[8] Shai Halevi,et al. Invertible Universal Hashing and the TET Encryption Mode , 2007, CRYPTO.
[9] Shai Halevi,et al. A Parallelizable Enciphering Mode , 2004, CT-RSA.
[10] Scott R. Fluhrer,et al. The Extended Codebook (XCB) Mode of Operation , 2004, IACR Cryptol. ePrint Arch..
[11] Palash Sarkar,et al. A general mixing strategy for the ECB-Mix-ECB mode of operation , 2008, Inf. Process. Lett..
[12] P. Sarkar. A New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices , 2008 .
[13] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[14] Peng Wang,et al. HCTR: A Variable-Input-Length Enciphering Mode , 2005, CISC.
[15] Palash Sarkar. Tweakable enciphering schemes using only the encryption function of a block cipher , 2011, Inf. Process. Lett..
[16] Shai Halevi,et al. A Tweakable Enciphering Mode , 2003, CRYPTO.
[17] M. Rabin,et al. Fast evaluation of polynomials by rational preparation , 1972 .