Online Ciphers and the Hash-CBC Construction, CRYPTO 2001, pp.292-309, 2001. ,
DOI : 10.1007/3-540-44647-8_18
On-line Ciphers and the Hash-CBC Constructions, Journal of Cryptology, vol.12, issue.1, pp.640-679, 2012. ,
DOI : 10.1007/s00145-011-9106-1
Deterministic and Efficiently Searchable Encryption, CRYPTO 2007, pp.535-552, 2007. ,
DOI : 10.1007/978-3-540-74143-5_30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.377.2792
A concrete security treatment of symmetric encryption, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.38-394, 1997. ,
DOI : 10.1109/SFCS.1997.646128
Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography, ASIACRYPT 2000, pp.317-330, 2000. ,
DOI : 10.1007/3-540-44448-3_24
Introduction to Modern Cryptography, UCSD CSE 207 Course Notes, p.207, 2005. ,
The Security of Triple Encryption and a Framework??for??Code-Based??Game-Playing??Proofs, EUROCRYPT 2006, pp.409-426, 2006. ,
DOI : 10.1007/11761679_25
Design and specification of cryptographic capabilities, IEEE Communications Society Magazine, vol.16, issue.6, pp.15-19, 1978. ,
DOI : 10.1109/MCOM.1978.1089775
EagleTree, Proceedings of the VLDB Endowment, vol.6, issue.12, pp.1290-1293, 2013. ,
DOI : 10.14778/2536274.2536298
URL : https://hal.archives-ouvertes.fr/hal-00935797
Recommendation for Block Cipher Modes of Operation: The XTS- AES Mode for Confidentiality on Storage Devices, NIST SP, pp.800-838, 2010. ,
DOI : 10.6028/NIST.SP.800-38e
AES-CBC + Elephant diffuser: A Disk Encryption Algorithm for Windows Vista, 2006. ,
New methods in hard disk encryption, 2005. ,
Security Notions for Disk Encryption, ESORICS 2005, pp.455-474, 2005. ,
DOI : 10.1007/11555827_26
Analysing Android's Full Disk Encryption Feature, JoWUA, vol.5, issue.1, pp.84-100, 2014. ,
EXT4 Encryption Design Document (public version), 2015. ,
Re: Lrw key derivation (formerly pink-herring), IEEE P1619 Mailing List, 2006. ,
A Parallelizable Enciphering Mode, CT-RSA 2004, pp.292-304, 2004. ,
DOI : 10.1007/978-3-540-24660-2_23
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.6717
Blockwise-Adaptive Attackers Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC, CRYPTO 2002, pp.17-30, 2002. ,
DOI : 10.1007/3-540-45708-9_2
Attack on Free-MAC (2000), https://groups ,
Encryption modes with almost free message integrity, EURO- CRYPT 2001, pp.529-544, 2001. ,
DOI : 10.1007/3-540-44987-6_32
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.7292
A Systematic Assessment of the Security of Full Disk Encryption, IEEE Transactions on Dependable and Secure Computing, vol.12, issue.5, pp.491-503, 2015. ,
DOI : 10.1109/TDSC.2014.2369041
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC, INDOCRYPT 2008, pp.350-362, 2008. ,
DOI : 10.1007/s00145-003-0220-6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.2987
Nonce-Based Symmetric Encryption, FSE 2004, pp.348-359, 2004. ,
DOI : 10.1007/978-3-540-25937-4_22
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.6810
Evaluation of Some Blockcipher Modes of Operation, Tech. rep., CRYPTREC Investigation Report, 2011. ,
Online Ciphers from Tweakable Blockciphers, CT- RSA 2011, pp.237-249, 2011. ,
DOI : 10.1007/978-3-540-74619-5_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.190.676
Encrypted Watermarks and Linux Laptop Security, WISA 04, pp.27-38, 2004. ,
DOI : 10.1007/978-3-540-31815-6_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.91.1265