2015
DOI: 10.1147/jrd.2015.2430071
|View full text |Cite
|
Sign up to set email alerts
|

The next generation of highly reliable and secure encryption for the IBM z13

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…According to game A in Table 1 and the definition of the prfadvantage in (19), we can define the following prf-advantages of adversary A over F K _MOD and Func_MOD:…”
Section: Appendix C Proof Of Lemmamentioning
confidence: 99%
See 1 more Smart Citation
“…According to game A in Table 1 and the definition of the prfadvantage in (19), we can define the following prf-advantages of adversary A over F K _MOD and Func_MOD:…”
Section: Appendix C Proof Of Lemmamentioning
confidence: 99%
“…Regarding the performance of FPE encryption methods, some studies have been done, however they are mainly related to software implementations [14], [16]- [18]. For performance benefits, a hardware implementation could be considered as in [13], [19] or [20]. A hardware implementation of an FPE stream cipher could be advantageous for that cases where a high encryption rate is important and the plaintext format preservation is mandatory.…”
Section: Introductionmentioning
confidence: 99%