We give new and shorter proofs for message integrity and confidentiality of the IAPM mode and of the IACBC mode proposed by Jutla. © International Association for Cryptologic Research 2007.
CITATION STYLE
Hastad, J. (2007). The security of the IAPM and IACBC modes. Journal of Cryptology, 20(2), 153–163. https://doi.org/10.1007/s00145-006-0225-z
Mendeley helps you to discover research relevant for your work.