Author of the publication

The XTS-AES Disk Encryption Algorithm and the Security of Ciphertext Stealing.

, , , , and . Cryptologia, 36 (1): 70-79 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The XTS-AES Disk Encryption Algorithm and the Security of Ciphertext Stealing., , , , and . Cryptologia, 36 (1): 70-79 (2012)Optimized Privacy-Preserving CNN Inference With Fully Homomorphic Encryption., and . IEEE Trans. Inf. Forensics Secur., (2023)Indirection systems for shingled-recording disk drives., , , , and . MSST, page 1-14. IEEE Computer Society, (2010)ZEA, A Data Management Approach for SMR., , , , , and . HotStorage, USENIX Association, (2016)Spider Codes: Practical erasure codes for distributed storage systems., , and . ISIT, page 1207-1211. IEEE, (2016)Optimizing Write Fidelity of MRAMs by Alternating Water-Filling Algorithm., , , , and . IEEE Trans. Commun., 70 (9): 5825-5836 (2022)A Parallel and Pipelined Architecture for Accelerating Fingerprint Computation in High Throughput Data Storages., , , , , , and . FCCM, page 203-206. IEEE Computer Society, (2015)On the Optimal Refresh Power Allocation for Energy-Efficient Memories., , , and . GLOBECOM, page 1-6. IEEE, (2019)Optimizing the Write Fidelity of MRAMs., , , and . ISIT, page 792-797. IEEE, (2020)On the Efficient Estimation of Min-Entropy., , and . IACR Cryptol. ePrint Arch., (2020)