Tài liệu tham khảo |
Loại |
Chi tiết |
[2] "Lightweight Cryptography Program of NIST," [Online]. Available: https://csrc.nist.gov/projects/lightweight-cryptography |
Sách, tạp chí |
Tiêu đề: |
Lightweight Cryptography Program of NIST |
|
[4] M. Bellare and C. Namprempre, "Authenticated encryption: Relations among notions andanalysis of the generic composition paradigm," in International Conference on the Theory and Application of Cryptology and Information Security, Springer, 2000, p. 531–545 |
Sách, tạp chí |
Tiêu đề: |
Authenticated encryption: Relations among notions andanalysis of the generic composition paradigm |
|
[5] C. S. Jutla, "Encryption modes with almost free message integrity," in International Conference on the Theory and Applications of Cryptographic Techniques, 2001, Springer, p. 529–544 |
Sách, tạp chí |
Tiêu đề: |
Encryption modes with almost free message integrity |
|
[6] P. Rogaway, M. Bellare, and J. Black. Ocb, "A block-cipher mode of operation for efficient authenticated encryption," in ACM Transactions on Information and System Security (TISSEC), 2003, p. 365–403 |
Sách, tạp chí |
Tiêu đề: |
A block-cipher mode of operation for efficient authenticated encryption |
|
[7] G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, "Permutation-based encryption, authentication and authenticated encryption," Directions in Authenticated Ciphers, 2012 |
Sách, tạp chí |
Tiêu đề: |
Permutation-based encryption, authentication and authenticated encryption |
|
[8] M. ˚Agren, M. Hell, T. Johansson, and W. Meier, "Grain-128a: a new version of grain-128 with optional authentication," in International Journal of Wireless and Mobile Computing, 2011, p. 48–59 |
Sách, tạp chí |
Tiêu đề: |
Grain-128a: a new version of grain-128 with optional authentication |
|
[9] Denning, Dorothy E.; Sacco, Giovanni Maria , "Timestamps in key distribution protocols," Communications of the ACM |
Sách, tạp chí |
Tiêu đề: |
Timestamps in key distribution protocols |
|
[10] B. PRENEEL, "Cryptographic Primitives for Information Authentication — State of the Art," in State of the Art in Applied Cryptography, Springer-Verlag, 1998, pp. 49- 104 |
Sách, tạp chí |
Tiêu đề: |
Cryptographic Primitives for Information Authentication — State of the Art |
|
[12] Tom Yu, Sam Hartman, Kenneth Raeburn , The Perils of Unauthenticated Encryption: Kerberos Version 4 ∗ |
Sách, tạp chí |
Tiêu đề: |
The Perils of Unauthenticated Encryption: Kerberos Version 4 |
|
[14] D. McGrew and J. Viega, "The galois/counter mode of operation (gcm)," NIST Modes Operation Symmetric Key Block Ciphers |
Sách, tạp chí |
Tiêu đề: |
The galois/counter mode of operation (gcm) |
|
[15] D. A. McGrew and J. Viega, "The security and performance of the galois/counter mode (gcm) of operation," in International Conference on Cryptology in India, Springer, 2004, p. 343–355 |
Sách, tạp chí |
Tiêu đề: |
The security and performance of the galois/counter mode (gcm) of operation |
|
[16] Markku-Juhani O. Saarinen, "Cycling attacks on gcm, ghash and other polynomial macs and hashes," in Fast Software Encryption, Springer, 2012, p. 216–225 |
Sách, tạp chí |
Tiêu đề: |
Cycling attacks on gcm, ghash and other polynomial macs and hashes |
|
[17] D. J. Bernstein, Caesar call for submissions, January 27, 2014 |
Sách, tạp chí |
Tiêu đề: |
Caesar call for submissions |
|
[18] F. Abed, C. Forler, and S. Lucks, "General classification of the authenticated encryption schemes for the caesar competition," in Computer Science Review, 2016, p. 13–26 |
Sách, tạp chí |
Tiêu đề: |
General classification of the authenticated encryption schemes for the caesar competition |
|
[19] Wu, Hongjun, ACORN: A Lightweight Authenticated Cipher (v3)., 2016 |
Sách, tạp chí |
Tiêu đề: |
ACORN: A Lightweight Authenticated Cipher (v3) |
|
[20] Md Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie, Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN, Singapore , 2016 |
Sách, tạp chí |
Tiêu đề: |
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN |
|
[21] T. Johansson and F. Jonsson, Advances in Cryptology — EUROCRYPT ’99. s.l., Springer-Verlag, 1999 |
Sách, tạp chí |
Tiêu đề: |
Advances in Cryptology — EUROCRYPT ’99. s.l |
|
[22] Siegenthaler, T., "Correlation-Immunity of Nonlinear Combining Functions for Cryptographic Applications," IEEE Transactions on Information Theory, 1984 |
Sách, tạp chí |
Tiêu đề: |
Correlation-Immunity of Nonlinear Combining Functions for Cryptographic Applications |
|
[23] V.V. Chepyzhov, T. Johansson and B. Smeets, Fast Software Encryption, 2000 |
Sách, tạp chí |
Tiêu đề: |
Fast Software Encryption |
|
[24] Willi MeierOthmar Staffelbach, "Fast Correlation Attacks on Certain Stream Ciphers," Journal of Cryptography, 1989 |
Sách, tạp chí |
Tiêu đề: |
Fast Correlation Attacks on Certain Stream Ciphers |
|