Sciweavers

59
Voted
ICICS
1997
Springer
15 years 3 months ago
Minimizing the use of random oracles in authenticated encryption schemes
Mihir Bellare, Phillip Rogaway
71
Voted
ICICS
1997
Springer
15 years 3 months ago
Stateless connections
We describe a secure transformation of stateful connections or parts of them into stateless ones by attaching the state information to the messages. Secret-key cryptography is used...
Tuomas Aura, Pekka Nikander