Design and cryptanalysis of a customizable authenticated encryption algorithm

作者: Matthew Joseph Kelly

DOI:

关键词: Computer securityAuthenticated encryptionComputer scienceCryptanalysisCryptography

摘要:

参考文章(43)
David A. McGrew, John Viega, The Galois/Counter Mode of Operation (GCM) ,(2005)
Douglas Stinson, Cryptography: Theory and Practice,Second Edition CRC/C&H. ,(2002)
Stefan Lucks, Jon Callas, The Skein Hash Function Family ,(2009)
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications Selected Areas in Cryptography. pp. 320- 337 ,(2012) , 10.1007/978-3-642-28496-0_19
Joan Daemen, Vincent Rijmen, The Wide Trail Design Strategy Lecture Notes in Computer Science. ,vol. 2260, pp. 222- 238 ,(2001) , 10.1007/3-540-45325-3_20
Joseph A. Gallian, Contemporary Abstract Algebra ,(1974)
Mihir Bellare, Phillip Rogaway, David Wagner, The EAX Mode of Operation fast software encryption. ,vol. 3017, pp. 389- 407 ,(2004) , 10.1007/978-3-540-25937-4_25
M.T. Kurdziel, J.J. Fitton, Baseline requirements for government and military encryption algorithms military communications conference. ,vol. 2, pp. 1491- 1497 ,(2002) , 10.1109/MILCOM.2002.1179704