Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography
- 27 October 2000
- book chapter
- Published by Springer Nature
- p. 317-330
- https://doi.org/10.1007/3-540-44448-3_24
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Advances in Cryptology — CRYPTO 2000Published by Springer Nature ,2000
- Agent Systems, Mobile Agents, and ApplicationsPublished by Springer Nature ,2000
- On the Construction of Variable-Input-Length CiphersPublished by Springer Nature ,1999
- On the Construction of Pseudorandom Permutations: Luby—Rackoff RevisitedJournal of Cryptology, 1999
- All-or-nothing encryption and the package transformPublished by Springer Nature ,1997
- Non-malleable cryptographyPublished by Association for Computing Machinery (ACM) ,1991
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- How to construct random functionsJournal of the ACM, 1986
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949