Author:
Lee Taekeon,Kim Jongsung,Lee Changhoon,Sung Jaechul,Lee Sangjin,Hong Dowon
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Baldwin, R., Rivest, R.: The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS algorithms, RFC 2040 (1996)
2. Biham, E.: Cryptanalysis of multiple modes of operation. Journal of Cryptology 11(1), 45–58 (1998)
3. Biham, E.: Cryptanalysis of triple modes of operation. Journal of Cryptology 12(3), 161–184 (1999)
4. Black, J., Urtubia, H.: Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption. In: Proc. of 11th USENIX Security Symposium, San Francisco, pp. 327–338 (2002)
5. Lecture Notes in Computer Science;D. Hong,2001
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A simple authentication encryption scheme;Concurrency and Computation: Practice and Experience;2017-02-02
2. Variable message encryption through blockcipher compression function;Concurrency and Computation: Practice and Experience;2016-10-12
3. A Blockcipher Based Authentication Encryption;Lecture Notes in Computer Science;2016
4. Error Oracle Attacks on Several Modes of Operation;Computational Intelligence and Security;2005