Cryptographic nonce

Known as: Nonce, Nonce (cryptography) 
In cryptography, a nonce is an arbitrary number that may only be used once. It is similar in spirit to a nonce word, hence the name. It is often a… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1986-2018
0204019862018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
We take nonce-based cryptography beyond symmetric encryption, developing it as a broad and practical way to mitigate damage… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2016
2016
We investigate nonce reuse issues with the GCM block cipher mode as used in TLS and focus in particular on AES-GCM, themost… (More)
  • figure 1
  • figure 2
Is this relevant?
2015
2015
A definition of online authenticated-encryption (OAE), call it OAE1, was given by Fleischmann, Forler, and Lucks (2012). It has… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
This paper introduces the XSalsa20 stream cipher. XSalsa20 is based upon the Salsa20 stream cipher but has a much longer nonce… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Symmetric encryption schemes are usually formalized so as to make the encryption operation a probabilistic or state-dependent… (More)
  • figure 6
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Nguyen and Shparlinski recently presented a polynomial-time algorithm that provably recovers the signer’s secret DSA key when a… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We present a polynomial-time algorithm that provably recovers the signer's secret DSA key when a few consecutive bits of the… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We investigate the following approach to symmetric encryption: rst encode the message via some keyless transform, and then… (More)
  • figure 1
Is this relevant?
Highly Cited
1993
Highly Cited
1993
The use of t imes t amps in key dis t r ibut ion protocols was suggested by Denning and Sacco [DS81]. T i m e s t a m p s are now… (More)
  • figure I
Is this relevant?
Highly Cited
1987
Highly Cited
1987
In a paper published in 1978 (Needham & Schroeder) we presented protocols for the use of encryption for authentication in large… (More)
Is this relevant?