Home / Books / cryptography&mathematics / authenticated encryption
File Name
Size
Date
  • ..
    —
    —
  • AEZ v4 Reference Implementation
    —
    04-07-2024 16:33:13
    AEZ v4 Authenticated Encryption by Enciphering (2015) - Hoang, Crovetz, Rogaway.pdf.gz
    196.44KB
    04-07-2024 16:33:14
    AEZ v5 Authenticated Encryption by Enciphering (2017) - Hoang, Krovetz, Rogaway.pdf.gz
    233.45KB
    04-07-2024 16:33:14
    Automated Analysis and Synthesis of Authenticated Encryption Schemes (2015) - Hoang, Katz, Malozemoff.pdf.gz
    810.80KB
    04-07-2024 16:33:14
    Boosting Authenticated Encryption Robustness With Minimal Modifications (2017) - Ashur, Dunkleman, Luykx.pdf.gz
    644.94KB
    04-07-2024 16:33:14
    Duplexing the Sponge Single-Pass Authenticated Encryption and Other Applications (2011) - Bertoni, Daemen, Peeters, Van Assche.pdf.gz
    353.88KB
    04-07-2024 16:33:14
    Farfalle parallel permutation-based cryptography (2016) - Bertoni, Daemen, Hoffert, Peeters, Van Assche, Van Keer.pdf.gz
    392.39KB
    04-07-2024 16:33:14
    HS1-SIV [Draft v2] (2014) - Krovetz.pdf.gz
    64.68KB
    04-07-2024 16:33:14
    HS1-SIV [v2] (2015) - Krovetz.pdf.gz
    121.62KB
    04-07-2024 16:33:14
    Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption (2015) - Granger, Jovanovic, Mennink, Neves.pdf.gz
    362.99KB
    04-07-2024 16:33:14
    The BRUTUS Automatic Cryptanalytic Framework Testing CAESAR Authenticated Encryption Candidates for Weaknesses (2015) - Saarinen.pdf.gz
    94.17KB
    04-07-2024 16:33:14

Powered by Kgay4all