In cryptography, a nonce is an arbitrary number that may only be used once. It is similar in spirit to a nonce word, hence the name. It is often aâ€¦Â (More)

Semantic Scholar uses AI to extract papers important to this topic.

2016

2016

- Mihir Bellare, BjÃ¶rn Tackmann
- EUROCRYPT
- 2016

We take nonce-based cryptography beyond symmetric encryption, developing it as a broad and practical way to mitigate damageâ€¦Â (More)

Is this relevant?

2016

2016

We investigate nonce reuse issues with the GCM block cipher mode as used in TLS and focus in particular on AES-GCM, themostâ€¦Â (More)

Is this relevant?

2015

2015

- Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, Damian VizÃ¡r
- CRYPTO
- 2015

A definition of online authenticated-encryption (OAE), call it OAE1, was given by Fleischmann, Forler, and Lucks (2012). It hasâ€¦Â (More)

Is this relevant?

2008

2008

This paper introduces the XSalsa20 stream cipher. XSalsa20 is based upon the Salsa20 stream cipher but has a much longer nonceâ€¦Â (More)

Is this relevant?

Highly Cited

2004

Highly Cited

2004

- Phillip Rogaway
- FSE
- 2004

Symmetric encryption schemes are usually formalized so as to make the encryption operation a probabilistic or state-dependentâ€¦Â (More)

Is this relevant?

Highly Cited

2003

Highly Cited

2003

- Phong Q. Nguyen, Igor E. Shparlinski
- Des. Codes Cryptography
- 2003

Nguyen and Shparlinski recently presented a polynomial-time algorithm that provably recovers the signerâ€™s secret DSA key when aâ€¦Â (More)

Is this relevant?

Highly Cited

2002

Highly Cited

2002

- Phong Q. Nguyen, Igor E. Shparlinski
- Journal of Cryptology
- 2002

We present a polynomial-time algorithm that provably recovers the signer's secret DSA key when a few consecutive bits of theâ€¦Â (More)

Is this relevant?

Highly Cited

2000

Highly Cited

2000

- Mihir Bellare, Phillip Rogaway
- ASIACRYPT
- 2000

We investigate the following approach to symmetric encryption: rst encode the message via some keyless transform, and thenâ€¦Â (More)

Is this relevant?

Highly Cited

1993

Highly Cited

1993

- B. Clifford Neuman, Stuart G. Stubblebine
- Operating Systems Review
- 1993

The use of t imes t amps in key dis t r ibut ion protocols was suggested by Denning and Sacco [DS81]. T i m e s t a m p s are nowâ€¦Â (More)

Is this relevant?

Highly Cited

1987

Highly Cited

1987

- Roger M. Needham, Michael D. Schroeder
- Operating Systems Review
- 1987

In a paper published in 1978 (Needham & Schroeder) we presented protocols for the use of encryption for authentication in largeâ€¦Â (More)

Is this relevant?