Encryption Modes with Almost Free Message Integrity
暂无分享,去创建一个
[1] Chanathip Namprempre,et al. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, ASIACRYPT.
[2] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[3] Hugo Krawczyk,et al. LFSR-based Hashing and Authentication , 1994, CRYPTO.
[4] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[5] Virgil D. Gligor,et al. On message integrity in cryptographic protocols , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Hugo Krawczyk,et al. UMAC: Fast and Secure Message Authentication , 1999, CRYPTO.
[7] Virgil D. Gligor,et al. Integrity-Aware PCBC Encryption Schemes , 1999, Security Protocols Workshop.
[8] Virgil D. Gligor,et al. Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes , 2001, FSE.
[9] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[10] Abraham Bookstein,et al. Cryptography: A new dimension in computer data security ? and ?. Wiley-Interscience, New York (1982). xxi + 775 pp., $43.95. ISBN 0471-04892-5. , 1985 .
[11] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[12] Michael Luby,et al. Pseudorandomness and cryptographic applications , 1996, Princeton computer science notes.
[13] Jonathan Katz,et al. Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation , 2000, FSE.