International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography

Authors:
Mihir Bellare
Phillip Rogaway
Download:
DOI: 10.1007/3-540-44448-3_24
Search ePrint
Search Google
Conference: ASIACRYPT 2000
BibTeX
@inproceedings{asiacrypt-2000-124,
  title={Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography},
  booktitle={Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={1976},
  pages={317-330},
  doi={10.1007/3-540-44448-3_24},
  author={Mihir Bellare and Phillip Rogaway},
  year=2000
}