33
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found

      Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance

      other

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references27

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          A Provable-Security Treatment of the Key-Wrap Problem

            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation

                Bookmark

                Author and book information

                Book Chapter
                2015
                August 1 2015
                : 493-517
                10.1007/978-3-662-47989-6_24
                178d08ff-7e4a-41a2-bde4-997e6bf6d8ea
                History

                Comments

                Comment on this book

                Book chapters

                Similar content5,219

                Cited by5