Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
- 21 June 2002
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- On message integrity in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- OCBPublished by Association for Computing Machinery (ACM) ,2001
- The use of Encryption in Kerberos for Network AuthenticationPublished by Springer Nature ,2001
- Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition ParadigmPublished by Springer Nature ,2000
- Complete characterization of security notions for probabilistic private-key encryptionPublished by Association for Computing Machinery (ACM) ,2000
- From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACsPublished by Springer Nature ,1998
- XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom FunctionsPublished by Springer Nature ,1995
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- Message Authentication with Manipulation Detection CodePublished by Institute of Electrical and Electronics Engineers (IEEE) ,1983
- Object Migration and AuthenticationIEEE Transactions on Software Engineering, 1979