„Authenticated Encryption“
Suchergebnisse
157 Treffer
-
Fast software encryption – 18th International Workshop ; revised selected papers
-
The BRUTUS automatic cryptanalytic framework – Testing CAESAR authenticated encryption candidates for weaknesses
-
Advances in cryptology
-
Trustworthy reconfigurable systems – enhancing the security capabilities of reconfigurable hardware architectures
-
Integrity analysis of authenticated encryption based on stream ciphers
-
Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security
-
A new strong security model for stateful authenticated group key exchange
-
Conditional Cube Attack on Round-Reduced ASCON
-
Security of Symmetric Primitives under Incorrect Usage of Keys
-
Cube-like Attack on Round-Reduced Initialization of Ketje Sr
-
Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP
-
Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
-
Stronger Security Variants of GCM-SIV
-
Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?
-
Strong authenticated key exchange with auxiliary inputs
-
TriviA and uTriviA: two fast and secure authenticated encryption schemes
-
RCB: leakage-resilient authenticated encryption via re-keying