Home
/
Books
/
cryptography&mathematics
/
authenticated encryption
File Name
Size
Date
..
—
—
AEZ v4 Reference Implementation
—
04-07-2024 16:33:13
AEZ v4 Authenticated Encryption by Enciphering (2015) - Hoang, Crovetz, Rogaway.pdf.gz
196.44KB
04-07-2024 16:33:14
AEZ v5 Authenticated Encryption by Enciphering (2017) - Hoang, Krovetz, Rogaway.pdf.gz
233.45KB
04-07-2024 16:33:14
Automated Analysis and Synthesis of Authenticated Encryption Schemes (2015) - Hoang, Katz, Malozemoff.pdf.gz
810.80KB
04-07-2024 16:33:14
Boosting Authenticated Encryption Robustness With Minimal Modifications (2017) - Ashur, Dunkleman, Luykx.pdf.gz
644.94KB
04-07-2024 16:33:14
Duplexing the Sponge Single-Pass Authenticated Encryption and Other Applications (2011) - Bertoni, Daemen, Peeters, Van Assche.pdf.gz
353.88KB
04-07-2024 16:33:14
Farfalle parallel permutation-based cryptography (2016) - Bertoni, Daemen, Hoffert, Peeters, Van Assche, Van Keer.pdf.gz
392.39KB
04-07-2024 16:33:14
HS1-SIV [Draft v2] (2014) - Krovetz.pdf.gz
64.68KB
04-07-2024 16:33:14
HS1-SIV [v2] (2015) - Krovetz.pdf.gz
121.62KB
04-07-2024 16:33:14
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption (2015) - Granger, Jovanovic, Mennink, Neves.pdf.gz
362.99KB
04-07-2024 16:33:14
The BRUTUS Automatic Cryptanalytic Framework Testing CAESAR Authenticated Encryption Candidates for Weaknesses (2015) - Saarinen.pdf.gz
94.17KB
04-07-2024 16:33:14
10" >