[1]Liskov M, Rivest L R, Wagner D. Tweakable Block Ciphers[C]//CRYPTO 2002:2442. Berlin: Springer-Verlag, 2002: 31-46.
[2]韦宝典, 刘景伟, 王新梅. NESSIE分组密码及其安全性分析[J]. 西安电子科技大学学报, 2004, 31(3), 377-382.
Wei B D, Liu J W, Wang X M. The NESSIE Block Cipher and Their Security[J]. Journal of Xidian University, 2004, 31(3): 377-382.
[3]Rogaway P. Efficient Instantiations of Tweakable Blockciphers and Refinemets to Modes OCB and PAMC[C]//ASIACRYPT 2004: 3329. Berlin: Springer-Verlag, 2004: 16-31.
[4]Luby M, Rackoff C. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions[J]. SIAM Journal on Computing, 1988, 17(2): 373-386.
[5]Naor M, Reingold O. On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited[J]. Journal of Cryptology, 1999, 12(1): 29-66.
[6]Halevi S, Rogaway P. A Tweakable Enciphering Mode[C]//CRYPTO 2003: 2729. Berlin: Springer-Verlag, 2003: 482-499.
[7]Halevi S, Rogaway P. A Parallelizable Enciphering Mode[C]//CT-RSA 2004: 2964. Berlin: Springer-Verlag: 292-304.
[8]Halevi S. EME*: Extending EME to Handle Arbitrary-Length Messages With Associated Data[C]//INDOCRYPT 2004: 3348. Berlin: Springer-Verlag, 2004: 315-327.
[9]McGrew A D, Fluhrer S. The Extended Codebook(XCB) Mode of Operation[EB/OL].[2007-05-03]. http://eprint.iacr.org/2004/278.
[10]Wang P, Feng D, Wu W. HCTR: a Viriable-Input-Length Enciphering Mode[C]//CISC 2005: 3822. Berlin: Springer-Verlag, 2005: 175-188.
[11]Chakraborty D, Sarkar P. HCH: a New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach[C]//Indocrypt 2006: 4329. Berlin: Springer-Verlag, 2006: 287-302.
[12]Chakraborty D, Sarkar P. A New Mode of Encryption Providing a Tweakable Strong Pseudo-Random Permutation[C]//FSE 2006: 4047. Berlin: Springer-Vrlag, 2006: 293-309.
[13]Halevi S. Invertible Universal Hashing and the TET Encryption Mode[C]//Crypto 2007: 4622. Berlin: Springer-Verlag, 2007: 412-429.
[14]Sarkar P. Improving Upon the TET Mode of Operation[C]//ICISC 2007: 4817. Berlin: Springer-Verlag, 2007: 180-192.
[15]Lopez M C, Chakraborty D, Henriquez R F. Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware[C]//Indocrypt 2007: 4859. Berlin: Springer-Verlag, 2007: 414-424.
[16]Minematsu K, Matsushima T. Tweakable Enciphering Schemes from Hash-Sum-Expansion[C]//Indocrypt 2007: 4859. Berlin: Springer-Verlag, 2007: 252-267. |