𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Ciphertext verification security of symmetric encryption schemes

✍ Scribed by ZhenYu Hu; FuChun Sun; JianChun Jiang


Book ID
107359527
Publisher
Science in China Press (SCP)
Year
2009
Tongue
English
Weight
397 KB
Volume
52
Category
Article
ISSN
1674-733X

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


The XTS-AES Disk Encryption Algorithm an
✍ Ball, Matthew V.; Guyot, Cyril; Hughes, James P.; Martin, Luther; Noll, Landon C πŸ“‚ Article πŸ“… 2012 πŸ› Taylor and Francis Group 🌐 English βš– 247 KB

This paper describes the importance of the XTS-AES encryption mode of operation and concludes with a new proof for the security of ciphertext stealing as used by XTS-AES. The XTS-AES mode is designed for encrypting data stored on hard disks where there is not additional space for an integrity field.

Comments on the security of Chen’s authe
✍ Mohamed Rasslan; Amr Youssef πŸ“‚ Article πŸ“… 2011 πŸ› Elsevier Science 🌐 English βš– 169 KB

Chen (Computers and Electrical Engineering, vol. 30, 2004) illustrated that Tseng et al.'s authenticated encryption schemes, with message linkages for message flows, do not achieve their claimed integrity and authenticity properties. Furthermore, Chen presented some modified schemes to repair these