Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
19
views
9
references
Top references
cited by
12
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,979
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Fast Software Encryption
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
other
Author(s):
Virgil D. Gligor
,
Pompiliu Donescu
Publication date
(Online):
June 21 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Information Services & Use
Most cited references
9
Record
: found
Abstract
: not found
Book Chapter
: not found
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
Mihir Bellare
,
Chanathip Namprempre
(2000)
0
comments
Cited
78
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions
Mihir Bellare
,
Roch Guérin
,
Phillip Rogaway
(1995)
0
comments
Cited
30
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs
Moni Naor
,
Omer Reingold
(1998)
0
comments
Cited
10
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2002
Publication date (Online):
June 21 2002
Pages
: 92-108
DOI:
10.1007/3-540-45473-X_8
SO-VID:
3b03cdac-6bd6-42fa-a8b2-a5d5669dd813
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 328
Flaws in Differential Cryptanalysis of Skipjack
pp. 92
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
pp. 152
A Practical Attack on Broadcast RC4
pp. 248
New Results on the Pseudorandomness of Some Blockcipher Constructions
pp. 336
Efficient Algorithms for Computing Differential Properties of Addition
Similar content
1,979
CBSeq: A Channel-level Behavior Sequence For Encrypted Malware Traffic Detection
Authors:
Susu Cui
,
Cong Dong
,
Meng Shen
…
A novel dataset for encrypted virtual private network traffic analysis
Authors:
Mohamed Naas
,
Jan Fesl
Bootstrapping for Approximate Homomorphic Encryption
Authors:
Jung Cheon
,
Kyoohyung Han
,
Andrey Kim
…
See all similar
Cited by
12
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
Authors:
Phillip Rogaway
The Security and Performance of the Galois/Counter Mode (GCM) of Operation
Authors:
David McGrew
,
John Viega
The EAX Mode of Operation
Authors:
Mihir Bellare
,
Phillip Rogaway
,
David K. Wagner
See all cited by