CryptoDB
Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography
Authors: | |
---|---|
Download: | |
Conference: | ASIACRYPT 2000 |
BibTeX
@inproceedings{asiacrypt-2000-124, title={Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography}, booktitle={Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series={Lecture Notes in Computer Science}, publisher={Springer}, volume={1976}, pages={317-330}, doi={10.1007/3-540-44448-3_24}, author={Mihir Bellare and Phillip Rogaway}, year=2000 }