IACR paper details
| Title | Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography |
|---|
| Booktitle | Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings |
|---|
| Volume | 1976 |
|---|
| Pages | 317-330 |
|---|
| Year | 2000 |
|---|
| URL | Search for the paper |
|---|
| DOI | 10.1007/3-540-44448-3_24 (link) |
|---|
| Author | Mihir Bellare |
|---|
| Author | Phillip Rogaway |
|---|
@inproceedings{asiacrypt-2000-124,
title={Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography},
booktitle={Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings},
series={Lecture Notes in Computer Science},
publisher={Springer},
volume={1976},
pages={317-330},
doi={10.1007/3-540-44448-3_24},
author={Mihir Bellare and Phillip Rogaway},
year=2000
}
Download a complete BibTeX file.