Authenticated encryption
Top View
- Homework 3: Authenticated Encryption and Public-Key Cryptography
- ACE: an Authenticated Encryption and Hash Algorithm Submission to the NIST LWC Competition
- On the Security of the CCM Encryption Mode and of a Slight Variant Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sebastien Zimmer
- The Best of Both Worlds Authenticated Encryption Table of Contents
- SHA-3: Where We've Been, Where We're Going
- Guidelines on Cryptographic Algorithms Usage and Key Management
- Algebraic Fault Analysis of SHA-3
- The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption
- Designs and Challenges in Authenticated Encryption
- FIPS 202, the SHA-3 Standard Overview and Recommendations
- NIST Cryptographic Standards & Their Adoptions in International / Industry
- A Critique of CCM 1 Introduction 2 Definition of CCM Mode
- Authenticated Encryption & AEAD
- Structural Classification of Authenticated Encryption Schemes
- High-Speed Encryption and Authentication
- Cryptography: Authentication
- Gimli 20190329
- Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition