Concealment and Its Applications to Authenticated Encryption
- 13 May 2003
- book chapter
- Published by Springer Nature
- p. 312-329
- https://doi.org/10.1007/3-540-39200-9_19
Abstract
No abstract availableKeywords
This publication has 26 references indexed in Scilit:
- On the Security of Joint Signature and EncryptionPublished by Springer Nature ,2002
- Formal Proofs for the Security of SigncryptionPublished by Springer Nature ,2002
- The Security of the Cipher Block Chaining Message Authentication CodeJournal of Computer and System Sciences, 2000
- Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition ParadigmPublished by Springer Nature ,2000
- Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient CryptographyPublished by Springer Nature ,2000
- Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened AssumptionsPublished by Springer Nature ,1999
- UMAC: Fast and Secure Message AuthenticationPublished by Springer Nature ,1999
- Collision-Resistant hashing: Towards making UOWHFs practicalPublished by Springer Nature ,1997
- High-bandwidth encryption with low-bandwidth smartcardsPublished by Springer Nature ,1996
- Optimal asymmetric encryptionPublished by Springer Nature ,1995