DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Authenticated encryption

Authenticated encryption

  • SHA-3 Update

    SHA-3 Update

  • Lecture9.Pdf

    Lecture9.Pdf

  • GCM) for Confidentiality And

    GCM) for Confidentiality And

  • Speeding up OMD Instantiations in Hardware

    Speeding up OMD Instantiations in Hardware

  • Hashes, Macs & Authenticated Encryption Today's Lecture Hashes

    Hashes, Macs & Authenticated Encryption Today's Lecture Hashes

  • Message Authentication Codes

    Message Authentication Codes

  • Authenticated Encryption Mode IAPM Using SHA-3'S Public Random

    Authenticated Encryption Mode IAPM Using SHA-3'S Public Random

  • Stronger Security Variants of GCM-SIV

    Stronger Security Variants of GCM-SIV

  • CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion

    CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion

  • LAC: a Lightweight Authenticated Encryption Cipher

    LAC: a Lightweight Authenticated Encryption Cipher

  • Security Analysis of BLAKE2's Modes of Operation

    Security Analysis of BLAKE2's Modes of Operation

  • Nist Sp 800-38D

    Nist Sp 800-38D

  • AUTHENTICATED ENCRYPTION in HARDWARE by Milind M. Parelkar

    AUTHENTICATED ENCRYPTION in HARDWARE by Milind M. Parelkar

  • SHA-3 and Permutation-Based Cryptography

    SHA-3 and Permutation-Based Cryptography

  • Message Franking Via Committing Authenticated Encryption∗

    Message Franking Via Committing Authenticated Encryption∗

  • COFFE: Ciphertext Output Feedback Faithful Encryption On-Line Authenticated Encryption Without a Block Cipher

    COFFE: Ciphertext Output Feedback Faithful Encryption On-Line Authenticated Encryption Without a Block Cipher

  • Authenticated Encryption

    Authenticated Encryption

  • AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1?

    AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1?

Top View
  • Homework 3: Authenticated Encryption and Public-Key Cryptography
  • ACE: an Authenticated Encryption and Hash Algorithm Submission to the NIST LWC Competition
  • On the Security of the CCM Encryption Mode and of a Slight Variant Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sebastien Zimmer
  • The Best of Both Worlds Authenticated Encryption Table of Contents
  • SHA-3: Where We've Been, Where We're Going
  • Guidelines on Cryptographic Algorithms Usage and Key Management
  • Algebraic Fault Analysis of SHA-3
  • The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption
  • Designs and Challenges in Authenticated Encryption
  • FIPS 202, the SHA-3 Standard Overview and Recommendations
  • NIST Cryptographic Standards & Their Adoptions in International / Industry
  • A Critique of CCM 1 Introduction 2 Definition of CCM Mode
  • Authenticated Encryption & AEAD
  • Structural Classification of Authenticated Encryption Schemes
  • High-Speed Encryption and Authentication
  • Cryptography: Authentication
  • Gimli 20190329
  • Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition


© 2024 Docslib.org    Feedback