DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» EAX mode
EAX mode
Analysis of Selected Block Cipher Modes for Authenticated Encryption
The EAX Mode of Operation
A E Speck
How to Enhance the Security of the 3GPP Confidentiality and Integrity
AUTHENTICATED ENCRYPTION in HARDWARE by Milind M. Parelkar
1 Block Cipher Modes of Operation from a Hardware Implementation Perspective
Mcoe: a Family of Almost Foolproof On-Line Authenticated Encryption Schemes
Design and Cryptanalysis of a Customizable Authenticated Encryption Algorithm
Improving the Sphinx Mix Network
On the Security of the CCM Encryption Mode and of a Slight Variant Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sebastien Zimmer
AVR2027: AES Security Module
VMPC-MAC: a Stream Cipher Based Authenticated Encryption Scheme
Atmel AT02333: Safe and Secure Bootloader Implementation for SAM3/4
CMAC CTR) and Encrypt-Then-MAC Composite (AES EAX) Modes of Operation in Cryptography Systems for Use in SMS-Based Secure Transmission
JAMBU Lightweight Authenticated Encryption Mode and AES-JAMBU
How to Choose an Authenticated Encryption Mode I'm a Cryptographer and Research Professor at Johns If You've Hung Around This Blog for a While, You Hopkins University
A Advanced Encryption Standard See AES AES 35–64 AES Process And
The EAX Mode of Operation
Top View
Combining Message Encryption and Authentication
Stronger Security Variants of GCM-SIV
Survey of Design and Security Evaluation of Authenticated Encryption Algorithms in the CAESAR Competition∗
OCB (V1.1) Submitted and Designed by Ted Krovetz and Phillip Rogaway
[email protected]
15 September 2016
JAMBU Lightweight Authenticated Encryption Mode and AES-JAMBU (V1)
Mcoe: a Family of Almost Foolproof On-Line Authenticated Encryption Schemes
A Few Thoughts on Cryptographic Engineering: Search Results for Authenticated
Authenticated Encryption – a Hardware Designer's Perspective
Design and Cryptanalysis of a Customizable Authenticated Encryption Algorithm Matthew Oj Seph Kelly
Generalized in a Straightforward Way to Include More Than One Round
Cryptanalysis of EAX-Prime
ECRYPT II Yearly Report on Algorithms and Keysizes (2011-2012)
Authenticated Encryption Modes for Tweakable Block Ciphers?
NIST Cryptographic Standards and Guidelines Development Process
Integrity-Aware Parallelizable Cipher Feedback Mode for Real- Time Cryptography
The Libgcrypt Reference Manual Version 1.9.0 18 January 2021
The EAX Mode of Operation
Iapm, Xcbc, Ocb, Ccm, Eax, Cwc, Gcm, Pcfb, Cs)
NIST Cryptographic Standards and Guidelines Development Program Briefing Book
Phillip Rogaway
[email protected]
SPAE a Mode of Operation for AES on Low-Cost Hardware
Authenticated Encryption 1 Introduction
EAX' Cipher Mode (May 2011)
Architecture Optimization and Performance Comparison of Nonce-Misuse-Resistant Authenticated Encryption Algorithms
SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things
Botan Reference Guide Release 2.18.1
The JAMBU Lightweight Authentication Encryption Mode (V2.1)
Deterministic Authenticated-Encryption a Provable-Security Treatment of the Key-Wrap Problem
On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption
Algorithms, Key Sizes and Parameters Report 2013 Recommendations Version 1.0 – October 2013
Implementation of EAX Mode of Operation Within a Real-Time Android Chatting Application