- Home
- » Tags
- » Authenticated encryption
Top View
- Homework 3: Authenticated Encryption and Public-Key Cryptography
- ACE: an Authenticated Encryption and Hash Algorithm Submission to the NIST LWC Competition
- On the Security of the CCM Encryption Mode and of a Slight Variant Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sebastien Zimmer
- The Best of Both Worlds Authenticated Encryption Table of Contents
- SHA-3: Where We've Been, Where We're Going
- Guidelines on Cryptographic Algorithms Usage and Key Management
- Algebraic Fault Analysis of SHA-3
- The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption
- Designs and Challenges in Authenticated Encryption
- FIPS 202, the SHA-3 Standard Overview and Recommendations
- NIST Cryptographic Standards & Their Adoptions in International / Industry
- A Critique of CCM 1 Introduction 2 Definition of CCM Mode
- Authenticated Encryption & AEAD
- Structural Classification of Authenticated Encryption Schemes
- High-Speed Encryption and Authentication
- Cryptography: Authentication
- Gimli 20190329
- Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
- The Security and Performance of the Galois/Counter Mode (GCM) of Operation (Full Version)
- Sha3: Where We've Been, Where We're Going
- Authenticated Encryption – a Hardware Designer's Perspective
- Symantec Corporation Symantec PGP Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy
- Authenticated-Encryption with Associated-Data
- Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality
- Post Quantum Secure Authentication Methods Suitable for Quantum Key Distribution
- Authenticated Encryption: How Reordering Can Impact Performance
- Submission to NIST: Counter with CBC-MAC (CCM) AES Mode Of
- Revisiting AES-GCM-SIV: Multi-User Security, Faster Key Derivation, and Better Bounds
- Authenticated Encryption Modes of Block Ciphers, Their Security and Implementation Properties
- Message Authentication Codes
- CSE 291-I: Applied Cryptography
- Appendix E Message Authentication Codes Based on Block Ciphers
- GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle Per Byte∗
- Design, Implementation and Analysis of Keyed Hash Functions Based on Chaotic Maps and Neural Networks Nabil Abdoun
- GCM-SIV Encrypt GCM-SIV AES-GCM Decrypt GCM-SIV
- Message Authentication Codes
- Iapm, Xcbc, Ocb, Ccm, Eax, Cwc, Gcm, Pcfb, Cs)
- Message Authentication Codes (Macs)
- AES-GCM-SIV: Specification and Analysis
- Authenticated Encryption 1 Introduction
- Authenticated Encryption
- Partitioning Oracle Attacks
- AES-CCM Encryption and Authentication Mode for 802.16
- A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization
- Side-Channel Countermeasure for SHA-3 at Almost-Zero Area Overhead
- NIST.SP.800-175Br1.Pdf
- VLSI Circuits for Cryptographic Authentication
- Deterministic Authenticated-Encryption a Provable-Security Treatment of the Key-Wrap Problem
- Collision-Resistant Hash Functions – Definitions – Examples • Merkle-Daamgard Transform – How to Construct Hash Function from Compression Function • Birthday Paradox
- Performance Comparison of AES-CCM and AES-GCM Authenticated Encryption Modes