Sciweavers

20 search results - page 2 / 4
» A Tweakable Enciphering Mode
Sort
View
WISA
2004
Springer
13 years 10 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
JOC
2011
79views more  JOC 2011»
12 years 7 months ago
Tweakable Block Ciphers
We propose a new cryptographic primitive, the “tweakable block cipher.” Such a cipher has not only the usual inputs—message and cryptographic key—but also a third input, th...
Moses Liskov, Ronald L. Rivest, David Wagner
FSE
2006
Springer
166views Cryptology» more  FSE 2006»
13 years 8 months ago
A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation
We present PEP, which is a new construction of a tweakable strong pseudo-random permutation. PEP uses a hash-encrypt-hash approach which has recently been used in the construction...
Debrup Chakraborty, Palash Sarkar
CTRSA
2004
Springer
124views Cryptology» more  CTRSA 2004»
13 years 10 months ago
A Parallelizable Enciphering Mode
We describe a block-cipher mode of operation, EME, that turns an n-bit block cipher into
Shai Halevi, Phillip Rogaway
CISC
2006
Springer
106views Cryptology» more  CISC 2006»
13 years 8 months ago
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
This work builds on earlier work by Rogaway at Asiacrypt 2004 on tweakable block cipher (TBC) and modes of operations. Our first contribution is to generalize Rogaway's TBC co...
Debrup Chakraborty, Palash Sarkar