Counter Chain: A New Block Cipher Mode of Operation
Aly Mohamed El-Semary, Mohamed Mostafa A. Azim, , Journal of Information Processing Systems Vol. 11, No. 2, pp. 266-279, Jun. 2015
https://doi.org/10.3745/JIPS.03.0031
Keywords: authentication, Block Cipher Mode, Confidentiality, Counter Mode, Counter Chain
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
El-Semary, A., Azim, M., & (2015). Counter Chain: A New Block Cipher Mode of Operation. Journal of Information Processing Systems, 11(2), 266-279. DOI: 10.3745/JIPS.03.0031.
[IEEE Style]
A. M. El-Semary, M. M. A. Azim, , "Counter Chain: A New Block Cipher Mode of Operation," Journal of Information Processing Systems, vol. 11, no. 2, pp. 266-279, 2015. DOI: 10.3745/JIPS.03.0031.
[ACM Style]
Aly Mohamed El-Semary, Mohamed Mostafa A. Azim, and . 2015. Counter Chain: A New Block Cipher Mode of Operation. Journal of Information Processing Systems, 11, 2, (2015), 266-279. DOI: 10.3745/JIPS.03.0031.