Nonce-based symmetric encryption
Symmetric encryption schemes are usually formalized so as to make the encryption operation a probabilistic or state-dependent function ε of the message M and the key K: the user supplies M and K and the encryption process does the rest, flipping coins or modifying internal state in order to produce...
Saved in:
Main Author: | Rogaway P. |
---|---|
Format: | Article |
Language: | English |
Published: |
2014
|
Online Access: | http://www.scopus.com/inward/record.url?eid=2-s2.0-35048855085&partnerID=40&md5=d9b69f01eae5ec1952ddf48893216edf http://cmuir.cmu.ac.th/handle/6653943832/6426 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Chiang Mai University |
Language: | English |
Similar Items
-
Searchable symmetric encryption
by: Thio, Brian Yu Li
Published: (2020) -
Authenticated-encryption with associated-data
by: Rogaway P.
Published: (2014) -
Symmetric-key homomorphic encryption for encrypted data processing
by: Chan, A.C.-F.
Published: (2013) -
Nonce regular and irregular verbs in contextualized and decontextualized tests: A comparison of ESL and EFL learners
by: Gonzalo, Bernardo O.
Published: (2022) -
Multi-user verifiable searchable symmetric encryption for cloud storage
by: LIU, Xueqiao, et al.
Published: (2020)