Cryptography in Theory and Practice: The Case of Encryption in IPsec
- 1 January 2006
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 21 references indexed in Scilit:
- Breaking and provably repairing the SSH authenticated encryption schemeACM Transactions on Information and System Security, 2004
- Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3Published by Springer Nature ,2004
- On message integrity in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Password Interception in a SSL/TLS ChannelPublished by Springer Nature ,2003
- Security Flaws Induced by CBC Padding — Applications to SSL, IPSEC, WTLS...Published by Springer Nature ,2002
- The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)Published by Springer Nature ,2001
- Unforgeable Encryption and Chosen Ciphertext Secure Modes of OperationPublished by Springer Nature ,2001
- Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition ParadigmPublished by Springer Nature ,2000
- Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient CryptographyPublished by Springer Nature ,2000
- IP Encapsulating Security Payload (ESP)Published by RFC Editor ,1995