Author:
Chakraborty Debrup,Sarkar Palash
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications
Reference63 articles.
1. Andreeva, E., Bogdanov, A., Luykx, A., Mennink, B., Tischhauser, E., Yasuda, K.: Parallelizable and authenticated online ciphers. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT (1), volume 8269 of Lecture Notes in Computer Science, pp. 424–443. Springer (2013)
2. Andreeva, E., Luykx, A., Mennink, A., Yasuda, K.: COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse. In: Cid, C., Rechberger, C. (eds.) FSE 2014, volume 8540 of Lecture notes in Computer Science, pp. 187–204. Springer (2015)
3. Aoki, K., Iwata, T., Yasuda, K.: How fast can a two-pass mode go? a parallel deterministic authenticated encryption mode for AES-NI. Directions in Authenticated Ciphers, workshop records (2012)
4. Bellare, M., Boldyreva, A., Knudsen, L.R., Chanathip, N.: Online ciphers and the Hash-CBC construction. In: Kilian, J. (ed.) CRYPTO, volume 2139 of Lecture Notes in Computer Science, pp. 292–309. Springer (2001)
5. Bellare, M., Kilian, J., Rogaway, P.: The security of cipher block chaining. In: Desmedt, Y. (ed.) CRYPTO, volume 839 of Lecture Notes in Computer Science, pp. 341–358. Springer (1994)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献