Authenticated encryption

Results: 182



#Item
91Key Establishment: Proofs and Refutations Kim-Kwang Raymond CHOO Bachelor of Science in Mathematics - Dec 2000 Bachelor of Applied Science (Hons) Industrial and Applied Maths - May 2002 Master of Information Technology -

Key Establishment: Proofs and Refutations Kim-Kwang Raymond CHOO Bachelor of Science in Mathematics - Dec 2000 Bachelor of Applied Science (Hons) Industrial and Applied Maths - May 2002 Master of Information Technology -

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:11:18
92GCM, GHASH and Weak Keys Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

GCM, GHASH and Weak Keys Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-05-09 07:04:03
93Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack Gregory V. Bard∗ August 18, 2006  Keywords: Blockwise-Adaptive Attack, Encryption Schemes, Chosen-Plaintext

Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack Gregory V. Bard∗ August 18, 2006 Keywords: Blockwise-Adaptive Attack, Encryption Schemes, Chosen-Plaintext

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-17 21:22:01
94Special Publication on Authenticated Encryption

Special Publication on Authenticated Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:49:40
95DupLESS: Server-Aided Encryption for Deduplicated Storage∗ Mihir Bellare  Sriram Keelveedhi

DupLESS: Server-Aided Encryption for Deduplicated Storage∗ Mihir Bellare Sriram Keelveedhi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-02 21:51:23
96YubiHSM User Manual Version: 1.0.4 May 21, 2012

YubiHSM User Manual Version: 1.0.4 May 21, 2012

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:06:44
97“Opportunistic” Encryption Strengthening the Internet Against Pervasive Monitoring (STRINT)  !1

“Opportunistic” Encryption Strengthening the Internet Against Pervasive Monitoring (STRINT) !1

Add to Reading List

Source URL: down.dsg.cs.tcd.ie

Language: English - Date: 2014-03-01 03:17:05
98Provably Insecure Mutual Authentication Protocols: The Two-Party Symmetric-Encryption Case Jim Alves-Foss Center for Secure and Dependable Software University of Idaho Moscow, ID[removed]

Provably Insecure Mutual Authentication Protocols: The Two-Party Symmetric-Encryption Case Jim Alves-Foss Center for Secure and Dependable Software University of Idaho Moscow, ID[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
99Tutorial on Keccak and SHA-3 by Guido Bertoni Abstract: Keccak has been selected as SHA-3 in[removed]It is a very flexible algorithm allowing to perform all the primitives of symmetric key cryptography: stream cipher, hash

Tutorial on Keccak and SHA-3 by Guido Bertoni Abstract: Keccak has been selected as SHA-3 in[removed]It is a very flexible algorithm allowing to perform all the primitives of symmetric key cryptography: stream cipher, hash

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2014-07-02 15:54:48
100Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard∗ May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard∗ May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-05-12 09:31:48