Online Ciphers and the Hash-CBC Construction
- 2 August 2001
- book chapter
- Published by Springer Nature
- p. 292-309
- https://doi.org/10.1007/3-540-44647-8_18
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- LFSR-based Hashing and AuthenticationPublished by Springer Nature ,2001
- The Security of the Cipher Block Chaining Message Authentication CodeJournal of Computer and System Sciences, 2000
- Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition ParadigmPublished by Springer Nature ,2000
- Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient CryptographyPublished by Springer Nature ,2000
- Software Performance of Universal Hash FunctionsPublished by Springer Nature ,1999
- On the Construction of Pseudorandom Permutations: Luby—Rackoff RevisitedJournal of Cryptology, 1999
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- How to construct random functionsJournal of the ACM, 1986
- Design and specification of cryptographic capabilitiesIEEE Communications Society Magazine, 1978