Analysis of EME produced by a microcontroller operation
References
Index Terms
- Analysis of EME produced by a microcontroller operation
Recommendations
On the Security Bounds of CMC, EME, EME + and EME* Modes of Operation
Information and Communications SecurityAbstractSince 2002, variants of two tweakable block cipher modes of operation, CMC and EME, have been presented by Halevi and Rogaway that are suitable for encryption of disk sectors. In this paper, we show that the security bounds given in their proofs ...
EME*: extending EME to handle arbitrary-length messages with associated data
INDOCRYPT'04: Proceedings of the 5th international conference on Cryptology in IndiaThis work describes a mode of operation, EME*, that turns a regular block cipher into a length-preserving enciphering scheme for messages of (almost) arbitrary length. Specifically, the resulting scheme can handle any bit-length, not shorter than the ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
- EDAA: European Design Automation Association
- IFIP WG 10.5: IFIP WG 10.5
- ECSI
- EDAC: Electronic Design Automation Consortium
- SIGDA: ACM Special Interest Group on Design Automation
- IEEE-CS\TTTC: Test Technology Technical Council
- IEEE-CS\DATC: IEEE Computer Society
- The Russian Academy of Sciences: The Russian Academy of Sciences
Publisher
IEEE Press
Publication History
Check for updates
Qualifiers
- Article
Conference
- EDAA
- IFIP WG 10.5
- EDAC
- SIGDA
- IEEE-CS\TTTC
- IEEE-CS\DATC
- The Russian Academy of Sciences
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigda
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 147Total Downloads
- Downloads (Last 12 months)5
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in