-
Notifications
You must be signed in to change notification settings - Fork 11
Expand file tree
/
Copy pathbibliography.bib
More file actions
29 lines (26 loc) · 902 Bytes
/
bibliography.bib
File metadata and controls
29 lines (26 loc) · 902 Bytes
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
@inproceedings{rogaway2006provable,
title={A provable-security treatment of the key-wrap problem},
author={Rogaway, Phillip and Shrimpton, Thomas},
booktitle={Annual International Conference on the Theory and Applications of Cryptographic Techniques},
pages={373--390},
year={2006},
organization={Springer}
}
@article{ferguson2005authentication,
title={Authentication weaknesses in GCM},
author={Ferguson, Niels},
journal={Comments submitted to NIST Modes of Operation Process},
pages={1--19},
year={2005}
}
@misc{joux2006authentication,
title={Authentication failures in NIST version of GCM (2006)},
author={Joux, Antoine},
year={2006}
}
@book{nistgcm,
title={Sp 800-38d. recommendation for block cipher modes of operation: Galois/counter mode (gcm) and gmac},
author={Dworkin, Morris J},
year={2007},
publisher={National Institute of Standards \& Technology}
}