References
[1]
Menezes A J, van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. Boca Raton: {CRC} Press, 1996.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Menezes A J, van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. Boca Raton: {CRC} Press, 1996&
[2]
中国标准出版社. 信息安全技术 分组密码算法的工作模式. GB/T 17964-2008. http://webstore.spc.net.cn/produce/ showonebook.asp?strid=36837. 2008.
Google Scholar
http://scholar.google.com/scholar_lookup?title=中国标准出版社. 信息安全技术 分组密码算法的工作模式. GB/T 17964-2008. http://webstore.spc.net.cn/produce/ showonebook.asp?strid=36837. 2008&
[3]
Bellare M, Desai A, Jokipii E, et al. A concrete security treatment of symmetric encryption. In: Proceedings of the 38th Annual Symposium on Foundations of Computer Science, Miami Beach, 1997. 394-403.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Bellare M, Desai A, Jokipii E, et al. A concrete security treatment of symmetric encryption. In: Proceedings of the 38th Annual Symposium on Foundations of Computer Science, Miami Beach, 1997. 394-403&
[4]
Sung J, Lee S, Lim J I, et al. Concrete security analysis of CTR-OFB and CTR-CFB modes of operation. In: Information Security and Cryptology -- ICISC 2001. Berlin: Springer, 2001. 103-113.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Sung J, Lee S, Lim J I, et al. Concrete security analysis of CTR-OFB and CTR-CFB modes of operation. In: Information Security and Cryptology -- ICISC 2001. Berlin: Springer, 2001. 103-113&
[5]
Jansen C J, Boekee D E. Modes of blockcipher algorithms and their protection against active eavesdropping. In: Advances in Cryptology -- EUROCRYPT'87. Berlin: Springer, 1987. 281-286.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Jansen C J, Boekee D E. Modes of blockcipher algorithms and their protection against active eavesdropping. In: Advances in Cryptology -- EUROCRYPT'87. Berlin: Springer, 1987. 281-286&
[6]
Jansen C J. Investigations on nonlinear streamcipher systems: construction and evaluation methods. Dissertation for Ph.D. Degree. Delft: Delft University of Technology, 1989.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Jansen C J. Investigations on nonlinear streamcipher systems: construction and evaluation methods. Dissertation for Ph.D. Degree. Delft: Delft University of Technology, 1989&
[7]
Barlow L C. Symmetric encryption with multiple keys: techniques and applications. Dissertation for Master Degree. Corvallis: Oregon State University, 2005.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Barlow L C. Symmetric encryption with multiple keys: techniques and applications. Dissertation for Master Degree. Corvallis: Oregon State University, 2005&
[8]
Preneel B. Analysis and design of cryptographic hash functions. Dissertation for Ph.D. Degree. Leuven: Katholieke Universiteit te Leuven, 1993.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Preneel B. Analysis and design of cryptographic hash functions. Dissertation for Ph.D. Degree. Leuven: Katholieke Universiteit te Leuven, 1993&
[9]
Joux A, Martinet G, Valette F. Blockwise-adaptive attackers revisiting the (in) security of some provably secure encryption modes: CBC, GEM, IACBC. In: Advances in Cryptology -- CRYPTO 2002. Berlin: Springer, 2002. 17-30.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Joux A, Martinet G, Valette F. Blockwise-adaptive attackers revisiting the (in) security of some provably secure encryption modes: CBC, GEM, IACBC. In: Advances in Cryptology -- CRYPTO 2002. Berlin: Springer, 2002. 17-30&
[10]
Bellare M, Rogaway P. The security of triple encryption and a framework for code-based game-playing proofs. In: Advances in Cryptology -- EUROCRYPT 2006. Berlin: Springer, 2006. 409-426.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Bellare M, Rogaway P. The security of triple encryption and a framework for code-based game-playing proofs. In: Advances in Cryptology -- EUROCRYPT 2006. Berlin: Springer, 2006. 409-426&
[11]
Fouque P A, Martinet G, Poupard G. Practical symmetric on-line encryption. In: Fast Software Encryption. Berlin: Springer, 2003. 362-375.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Fouque P A, Martinet G, Poupard G. Practical symmetric on-line encryption. In: Fast Software Encryption. Berlin: Springer, 2003. 362-375&
[12]
Goldwasser
S,
Micali
S.
J Comput Syst Sci,
1984, 28: 270-299
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?author=Goldwasser S&author=Micali S&publication_year=1984&journal=J Comput Syst Sci&volume=28&pages=270-299
[13]
Namprempre C, Rogaway P, Shrimpton T. Reconsidering generic composition. In: Advances in Cryptology -- EUROCRYPT 2014. Berlin: Springer, 2014. 257-274.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Namprempre C, Rogaway P, Shrimpton T. Reconsidering generic composition. In: Advances in Cryptology -- EUROCRYPT 2014. Berlin: Springer, 2014. 257-274&
[14]
Rogaway P. Nonce-based symmetric encryption. In: Fast Software Encryption. Berlin: Springer, 2004. 348-358.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Rogaway P. Nonce-based symmetric encryption. In: Fast Software Encryption. Berlin: Springer, 2004. 348-358&
[15]
Goldwasser S, Bellare M. Lecture notes on cryptography. http://cseweb.ucsd.edu/ mihir/papers/gb.pdf. 2008.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Goldwasser S, Bellare M. Lecture notes on cryptography. http://cseweb.ucsd.edu/ mihir/papers/gb.pdf. 2008&
[16]
Bellare
M,
Kilian
J,
Rogaway
P.
J Comput Syst Sci,
2000, 61: 362-399
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?author=Bellare M&author=Kilian J&author=Rogaway P&publication_year=2000&journal=J Comput Syst Sci&volume=61&pages=362-399
[17]
Luby
M,
Rackoff
C.
SIAM J Comput,
1988, 17: 373-386
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?author=Luby M&author=Rackoff C&publication_year=1988&journal=SIAM J Comput&volume=17&pages=373-386
[18]
Bellare M, Goldreich O, Mityagin A. The power of verification queries in message authentication and authenticated encryption. Cryptology ePrint Archive, 2004, 2004: 309.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Bellare M, Goldreich O, Mityagin A. The power of verification queries in message authentication and authenticated encryption. Cryptology ePrint Archive, 2004, 2004: 309&
[19]
Hoang V T, Reyhanitabar R, Rogaway P, et al. Online authenticated-encryption and its nonce-reuse misuse-resistance. IACR Cryptology ePrint Archive, 2015, 2015: 189.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Hoang V T, Reyhanitabar R, Rogaway P, et al. Online authenticated-encryption and its nonce-reuse misuse-resistance. IACR Cryptology ePrint Archive, 2015, 2015: 189&
[20]
Andreeva E, Bogdanov A, Luykx A, et al. How to securely release unverified plaintext in authenticated encryption. In: Advances in Cryptology -- ASIACRYPT 2014. Berlin: Springer, 2014. 105-125.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Andreeva E, Bogdanov A, Luykx A, et al. How to securely release unverified plaintext in authenticated encryption. In: Advances in Cryptology -- ASIACRYPT 2014. Berlin: Springer, 2014. 105-125&
[21]
Agrawal M, Chang D, Sanadhya S. Sp-AELM: sponge based authenticated encryption scheme for memory constrained devices. In: Information Security and Privacy. Berlin: Springer, 2015. 451-468.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Agrawal M, Chang D, Sanadhya S. Sp-AELM: sponge based authenticated encryption scheme for memory constrained devices. In: Information Security and Privacy. Berlin: Springer, 2015. 451-468&
[22]
Hoang V T, Krovetz T, Rogaway P. Robust authenticated-encryption AEZ and the problem that it solves. In: Advances in Cryptology -- EUROCRYPT 2015. Berlin: Springer, 2015. 15-44.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Hoang V T, Krovetz T, Rogaway P. Robust authenticated-encryption AEZ and the problem that it solves. In: Advances in Cryptology -- EUROCRYPT 2015. Berlin: Springer, 2015. 15-44&
[23]
Rogaway P, Zhang H. Online ciphers from tweakable blockciphers. In: Topics in Cryptology -- CT-RSA 2011. Berlin: Springer, 2011. 14-18.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Rogaway P, Zhang H. Online ciphers from tweakable blockciphers. In: Topics in Cryptology -- CT-RSA 2011. Berlin: Springer, 2011. 14-18&
[24]
Rogaway P. Evaluation of some blockcipher modes of operation. http://web.cs.ucdavis.edu/ rogaway/papers/modes-cryptrec.pdf. 2011.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Rogaway P. Evaluation of some blockcipher modes of operation. http://web.cs.ucdavis.edu/ rogaway/papers/modes-cryptrec.pdf. 2011&
[25]
国家商用密码管理办公室. 无线局域网产品使用 的SMS4密码算法. http://www.oscca.gov.cn/News/200705/ News\_1106.html.
Google Scholar
http://scholar.google.com/scholar_lookup?title=国家商用密码管理办公室. 无线局域网产品使用 的SMS4密码算法. http://www.oscca.gov.cn/News/200705/ News\_1106.html&