Author of the publication

Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes.

, , , and . IEEE Trans. Computers, 62 (2): 279-294 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware., , and . INDOCRYPT, volume 4859 of Lecture Notes in Computer Science, page 414-424. Springer, (2007)HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach., and . INDOCRYPT, volume 4329 of Lecture Notes in Computer Science, page 287-302. Springer, (2006)An Improved Security Bound for HCTR., and . FSE, volume 5086 of Lecture Notes in Computer Science, page 289-302. Springer, (2008)Another Look at XCB., , and . IACR Cryptology ePrint Archive, (2013)Objective reduction using a feature selection technique., , and . GECCO, page 673-680. ACM, (2008)On the security of TrCBC., and . Inf. Process. Lett., (2023)Designing tweakable enciphering schemes using public permutations., , and . Adv. Math. Commun., 17 (4): 771-798 (2023)A Cryptographic Study of Tokenization Systems., , and . SECRYPT, page 393-398. SciTePress, (2014)Double Ciphertext Mode : A Proposal for Secure Backup., and . IACR Cryptology ePrint Archive, (2010)Evaluating Bernstein-Rabin-Winograd Polynomials., , and . IACR Cryptology ePrint Archive, (2017)