CWC: A High-Performance Conventional Authenticated Encryption Mode
暂无分享,去创建一个
[1] Russ Housley,et al. Counter with CBC-MAC (CCM) , 2003, RFC.
[2] David McGrew. Integer Counter Mode , 2001 .
[3] David McGrew. The Universal Security Transform , 2001 .
[4] Hugo Krawczyk,et al. The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) , 2001, CRYPTO.
[5] David McGrew. The Truncated Multi-Modular Hash Function (TMMH) , 2001 .
[6] Virgil D. Gligor,et al. Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes , 2001, FSE.
[7] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[8] Bart Preneel,et al. Software Performance of Universal Hash Functions , 1999, EUROCRYPT.
[9] Hugo Krawczyk,et al. LFSR-based Hashing and Authentication , 1994, CRYPTO.
[10] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[11] Daniel J. Bernstein,et al. FLOATING-POINT ARITHMETIC AND MESSAGE AUTHENTICATION , 2000 .
[12] John Black,et al. A Block-Cipher Mode of Operation for Parallelizable Message Authentication , 2002, EUROCRYPT.
[13] Mihir Bellare,et al. The EAX Mode of Operation , 2004, FSE.
[14] David A. Wagner,et al. A Critique of CCM , 2003, IACR Cryptol. ePrint Arch..
[15] Mihir Bellare,et al. XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.
[16] Phillip Rogaway,et al. Bucket Hashing and Its Application to Fast Message Authentication , 1995, Journal of Cryptology.
[17] Victor Shoup,et al. On Fast and Provably Secure Message Authentication Based on Universal Hashing , 1996, CRYPTO.
[18] Douglas R. Stinson,et al. Universal hashing and authentication codes , 1991, Des. Codes Cryptogr..
[19] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[20] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[21] Mihir Bellare,et al. OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.
[22] Jonathan Katz,et al. Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation , 2000, FSE.
[23] Phillip Rogaway,et al. Authenticated-encryption with associated-data , 2002, CCS '02.
[24] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.