Sciweavers

Share
ASIACRYPT   2015 International Conference on Cryptology
Wall of Fame | Most Viewed ASIACRYPT-2015 Paper
ASIACRYPT
2015
Springer
2 years 8 months ago
Collision Attacks Against CAESAR Candidates - Forgery and Key-Recovery Against AEZ and Marble
In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook). These algorithms use secret offsets (masks derived from a whitening key) to...
Thomas Fuhr, Gaëtan Leurent, Valentin Suder
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source46
2Download preprint from source45
3Download preprint from source39
4Download preprint from source37
5Download preprint from source35
6Download preprint from source33
7Download preprint from source33
8Download preprint from source29
9Download preprint from source28
10Download preprint from source28
11Download preprint from source28
12Download preprint from source27
13Download preprint from source27
14Download preprint from source27
15Download preprint from source27
16Download preprint from source26
17Download preprint from source26
18Download preprint from source26
19Download preprint from source25
20Download preprint from source25
21Download preprint from source24
22Download preprint from source24
23Download preprint from source24
24Download preprint from source23
25Download preprint from source23
26Download preprint from source23
27Download preprint from source23
28Download preprint from source21
29Download preprint from source21
30Download preprint from source21
31Download preprint from source21
32Download preprint from source20
33Download preprint from source19
34Download preprint from source19
35Download preprint from source19
36Download preprint from source19
37Download preprint from source19
38Download preprint from source19
39Download preprint from source18
40Download preprint from source18
41Download preprint from source17
42Download preprint from source15
43Download preprint from source15
44Download preprint from source14
books