Author:
Morris Ben,Rogaway Phillip,Stegers Till
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference42 articles.
1. W. Aiello, R. Venkatesan, Foiling birthday attacks in length-doubling transformations: Benes: a non-reversible alternative to Feistel, in EUROCRYPT 1996, LNCS, vol. 1070 (Springer, 1996), pp. 307–320
2. T. Baignères, J. Stern, S. Vaudenay, Linear cryptanalysis of non binary ciphers (with an application to SAFER), in Selected Areas in Cryptography 2007, LNCS vol. 4876 (Springer, 2007), pp. 184–211
3. M. Bellare, V.T. Hoang, S. Tessaro, Message-recovery attacks on Feistel-based format preserving encryption, in ACM Conference on Computer and Communications Security (CCS 2016) (ACM Press, 2016), pp. 444–455
4. M. Bellare, T. Ristenpart, P. Rogaway, T. Stegers, Format-preserving encryption, in Selected Areas in Cryptography (SAC 2009), LNCS vol. 5867 (Springer, 2009), pp. 295–312
5. M. Bellare, P. Rogaway, T. Spies, The FFX mode of operation for format-preserving encryption. NIST submission (2010).
http://ccsrc.nist.gov/groups/ST/toolkit/BCM/modes_development.html
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. How to Hide MetaData in MLS-Like Secure Group Messaging;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07
2. Format-preserving encryption: a survey;Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography];2022-06
3. Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries;Lecture Notes in Computer Science;2019