The XTS-AES Disk Encryption Algorithm and the Security of Ciphertext Stealing
暂无分享,去创建一个
Cyril Guyot | James P. Hughes | Luther Martin | Matthew V. Ball | Landon Curt Noll | Luther Martin | Cyril Guyot | James P. Hughes | L. Noll | Matthew V. Ball
[1] Kazuhiko Minematsu,et al. Comments on XTS-AES , 2008 .
[2] David A. Wagner,et al. Tweakable Block Ciphers , 2002, Journal of Cryptology.
[3] William Stallings. NIST Block Cipher Modes of Operation for Confidentiality , 2010, Cryptologia.
[4] Stephen M. Matyas,et al. Cryptography: A New Dimension in Computer Data Security--A Guide for the Design and Implementation of Secure Systems , 1982 .
[5] Kazuhiko Minematsu,et al. Improved Security Analysis of XEX and LRW Modes , 2006, Selected Areas in Cryptography.
[6] Morris J. Dworkin. SP 800-38C. Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality , 2004 .
[7] Morris J. Dworkin. SP 800-38E. Recommendation for Block Cipher Modes of Operation: the XTS-AES Mode for Confidentiality on Storage Devices , 2010 .
[8] Morris J. Dworkin,et al. SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication , 2005 .
[9] Phillip Rogaway,et al. Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC , 2004, ASIACRYPT.
[10] William Stallings,et al. NIST Block Cipher Modes of Operation for Authentication and Combined Confidentiality and Authentication , 2010, Cryptologia.