Author:
Andreeva Elena,Bogdanov Andrey,Datta Nilanjan,Luykx Atul,Mennink Bart,Nandi Mridul,Tischhauser Elmar,Yasuda Kan
Publisher
Springer Science and Business Media LLC
Reference18 articles.
1. E. Andreeva, A. Bogdanov, N. Datta, A. Luykx, B. Mennink, M. Nandi, E. Tischhauser, K. Yasuda, COLM (2014), submission to CAESAR competition
2. E. Andreeva, A. Bogdanov, A. Luykx, B. Mennink, N. Mouha, K. Yasuda, How to securely release unverified plaintext in authenticated encryption, in Sarkar, P., Iwata, T. (eds.) Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Lecture Notes in Computer Science, vol. 8873 (Springer, 2014), pp. 105–125. https://doi.org/10.1007/978-3-662-45611-8_6
3. E. Andreeva, A. Bogdanov, A. Luykx, B. Mennink, E. Tischhauser, K. Yasuda, Parallelizable and authenticated online ciphers, in Sako, K., Sarkar, P. (eds.) Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1–5, 2013, Proceedings, Part I. Lecture Notes in Computer Science, vol. 8269 (Springer, 2013), pp. 424–443. https://doi.org/10.1007/978-3-642-42033-7_22
4. M. Bellare, A. Boldyreva, L.R. Knudsen, C. Namprempre, Online ciphers and the hash-cbc construction, in Kilian, J. (ed.) Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19–23, 2001, Proceedings. Lecture Notes in Computer Science, vol. 2139 (Springer, 2001), pp. 292–309. https://doi.org/10.1007/3-540-44647-8_18
5. G. Bertoni, J. Daemen, M. Peeters, G. Van Assche, R. Van Keer, Keyak v1 (2014), submission to CAESAR competition