Sciweavers

7 search results - page 2 / 2
» Pseudorandom Functions and Permutations Provably Secure agai...
Sort
View
ACNS
2008
Springer
143views Cryptology» more  ACNS 2008»
14 years 12 days ago
On the Security of the CCM Encryption Mode and of a Slight Variant
In this paper, we present an analysis of the CCM mode of operations and of a slight variant. CCM is a simple and efficient encryption scheme which combines a CBC-MAC authentication...
Pierre-Alain Fouque, Gwenaëlle Martinet, Fr&e...
EUROCRYPT
2007
Springer
14 years 6 days ago
Feistel Networks Made Public, and Applications
Feistel Network, consisting of a repeated application of the Feistel Transform, gives a very convenient and popular method for designing “cryptographically strong” permutations...
Yevgeniy Dodis, Prashant Puniya