On the security bounds of CMC, EME, EME(+) and EME* - Modes of operation
Since 2002, variants of two tweakable block cipher modes of operation, CMC and EME, have been presented by Halevi and Rogaway that are suitable for encryption of disk sectors. In this paper, we show that the security bounds given in their proofs are tight, and hence complement the security proofs of...
| Main Authors: | Phan, , RCW, Goi, , BM |
|---|---|
| Format: | Article |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2351/ |
Similar Items
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Case-Based Legal System / Emee Rahman Zakaria
by: Emee Rahman , Zakaria
Published: (2003)
by: Emee Rahman , Zakaria
Published: (2003)
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
Flaws in generic watermarking protocols based on zero-knowledge proofs
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
MaTRU: A new NTRU-based cryptosystem
by: Coglianese, , M, et al.
Published: (2005)
by: Coglianese, , M, et al.
Published: (2005)
Smart home microcontroller: Telephone interfacing
by: Leong, , CS, et al.
Published: (2006)
by: Leong, , CS, et al.
Published: (2006)
EME 452 – Tribology (Tribologi)
by: Mekanik, Pusat Pengajian Kejuruteraan
Published: (2022)
by: Mekanik, Pusat Pengajian Kejuruteraan
Published: (2022)
EME 442 – Biomechanics (Biomekanik)
by: PPKM, Pusat Pengajian Kejuruteraan Mekanikal
Published: (2024)
by: PPKM, Pusat Pengajian Kejuruteraan Mekanikal
Published: (2024)
EME 452 – Tribology (Tribologi)
by: PPKM, Pusat Pengajian Kejuruteraan Mekanikal
Published: (2024)
by: PPKM, Pusat Pengajian Kejuruteraan Mekanikal
Published: (2024)
Cryptanalysis of PASS II and MiniPass
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
Bounded Box-Zoning Integrated Approach For Children Handwriting Recognition
by: Qausbee, Nik Nur Adlin Nik
Published: (2024)
by: Qausbee, Nik Nur Adlin Nik
Published: (2024)
EME 452 – TRIBOLOGY
Duration: 2 hours
by: Mekanik, Pusat Pengajian Kejuruteraan
Published: (2021)
by: Mekanik, Pusat Pengajian Kejuruteraan
Published: (2021)
Security mediated certificateless signatures
by: Yap, Nvun-She, et al.
Published: (2007)
by: Yap, Nvun-She, et al.
Published: (2007)
Online securities trading and control of securities offences in Malaysia
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
Online securities trading and control of securities offences in Malaysia
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
A model for secure knowledge sharing
by: Ismail Ahmad,, et al.
Published: (2005)
by: Ismail Ahmad,, et al.
Published: (2005)
Flood Prediction Based On Deep Learning Networks With Variational Mode Decomposition
by: Ni, Chenmin
Published: (2024)
by: Ni, Chenmin
Published: (2024)
Efficient NEMO Security Management Via CAPKI.
by: Tat, Kin Tan, et al.
Published: (2007)
by: Tat, Kin Tan, et al.
Published: (2007)
EME 4313 – REFRIGERATION & AIR CONDITIONING NOV 2010.
by: PPKM, Pusat Pengajian Kejuruteraan Mekanikal
Published: (2010)
by: PPKM, Pusat Pengajian Kejuruteraan Mekanikal
Published: (2010)
EME 4513 – COMPUTATIONAL FLUID DYNAMICS NOVEMBER 2010.
by: PPKM, Pusat Pengajian Kejuruteraan Mekanikal
Published: (2010)
by: PPKM, Pusat Pengajian Kejuruteraan Mekanikal
Published: (2010)
EME 451-3 - PENGKOMPUTERAN DINAMIK JANUARI 2012
by: PPKM, Pusat Pengajian Kejuruteraan Mekanikal
Published: (2012)
by: PPKM, Pusat Pengajian Kejuruteraan Mekanikal
Published: (2012)
EME 431 REFRIGERATION & AIR CONDITIONING (DEC 2015)
by: PPKM, Pusat Pengajian Kejuruteraan Mekanikal
by: PPKM, Pusat Pengajian Kejuruteraan Mekanikal
EME 451 COMPUTATIONAL FLUID DYNAMICS (DEC 2015)
by: PPKM, Pusat Pengajian Kejuruteraan Mekanikal
by: PPKM, Pusat Pengajian Kejuruteraan Mekanikal
CST334 – Network Monitoring & Security (Pengawasan & Keselamatan Rangkaian) CST338 – Network & Communication Security (Keselamatan Rangkaian & Komunikasi)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
CST334 – Network Monitoring & Security
(Pengawasan & Keselamatan Rangkaian)
CST338 – Network And Communication Security
(Keselamatan Rangkaian Dan Komunikasi)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
CST314 - NETWORK AND SECURITY MANAGEMENT MARCH 05.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
Development Of Penetration Testing Model For Increasing Network Security.
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
CST314 - NETWORK MANAGEMENT AND SECURITY APRIL 2008.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CST334 - NETWORK MONITORING AND SECURITY APRIL 2008.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
Securing Telecommunication Based On Speaker Voice As The Public Key.
by: Enayah, Monther Rateb, et al.
Published: (2007)
by: Enayah, Monther Rateb, et al.
Published: (2007)
Security Mechanisms For The Ipv4 To Ipv6 Transition.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
CCS523 – COMPUTER SECURITY AND CRYPTOGRAPHY NOV 2010
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
CCS523- COMPUTER SECURITY AND CRYPTOGRAPHY JANUARI 2012
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
CST 314 - NETWORK MANAGEMENT AND SECURITY APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CST 314 - NETWORK MANAGEMENT AND SECURITY APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
Similar Items
-
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005) -
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005) -
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005) -
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005) -
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005)