Amanote Research

Amanote Research

    RegisterSign In

Counter-In-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-662-53018-4_2
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2016

Authors
Thomas PeyrinYannick Seurin
Publisher

Springer Berlin Heidelberg


Related search

Stream vs Block Ciphers for Scan Encryption

Microelectronics Journal
2019English

Low Area and Low Power Implementation for Competition for Authenticated Encryption, Security, Applicability, and Robustness Authenticated Ciphers

Journal of Low Power Electronics
Electronic EngineeringElectrical
2019English

Authenticated On-Line Encryption

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2004English

Known-Iv Attacks on Triple Modes of Operation of Block Ciphers

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2001English

Protecting FPGA Bitstreams Using Authenticated Encryption

2013English

Provable-Security Analysis of Authenticated Encryption in Kerberos

IET Information Security
Computer NetworksSoftwareInformation SystemsCommunications
2011English

Concealment and Its Applications to Authenticated Encryption

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2003English

Algebraic Cryptanalysis of Block Ciphers

2019English

ASC-1: An Authenticated Encryption Stream Cipher

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy