References
1. Shannon, C.: Communication Theory and Secrecy Systems. Bell Telephone Laboratories
(1949)
2. Gilbert, E., MacWilliams, F., Sloane, N.: Codes which detect deception. Bell System Tech-
nical Journal 53 (1974) 405–424
3. Wegman, M., Carter, J.: New classes and applications of hash functions. Foundations of
Computer Science, 1979., 20th Annual Symposium on (1979) 175–182
4. Black, J., Halevi, S., Krawczyk, H., Krovetz, T., Rogaway, P.: UMAC: Fast and Secure
Message Authentication. Advances in Cryptology-Crypto’99: 19th Annual International
Cryptology Conference, Santa Barbara, California, USA August 15-19, 1999 Proceedings
(1999)
5. US National Bureau of Standards: DES Modes of Operation. Federal Information Process-
ing Standard (FIPS) Publication 81 Available as http://www.itl.nist.gov/fipspubs/fip81.htm
(December 1980)
6. Bellare, M., Guerin, R., Rogaway, P.: XOR MACs: New methods for message authentication
using finite pseudorandom functions. Advances in Cryptology–CRYPTO95 (LNCS 963)
(1995) 15–28
7. Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication.
Advances in Cryptology–CRYPTO 96 (1996) 1–15
8. Rogaway, P., Black, J.: PMAC: Proposal to NIST for a parallelizable message authentication
code (2001)
9. Ylonen, T., Lonvick, C.: The Secure Shell (SSH) Transport Layer Protocol. Technical report,
(RFC 4253, January 2006)
10. Freier, A., Karlton, P., Kocher, P.: The SSL Protocol Version 3.0 (1996)
11. Kent, S.: RFC4303: IP encapsulating security payload (ESP),. Internet EFC. STD. FYI/BCP
archives. December (2005)
12. Bellare, M., Namprempre, C.: Authenticated Encryption: Relations among Notions and
Analysis of the Generic Composition Paradigm. Proceedings of the 6th International Con-
ference on the Theory and Application of Cryptology and Information Security: Advances
in Cryptology–ASIACRYPT (2000) 531–545
13. KRAWCZYK, H.: The order of encryption and authentication for protecting communica-
tions(or: How secure is SSL?). Advances in Cryptology–CRYPTO 2001 (2001) 310–331
14. Meyer, C., Matyas, S.: Cryptography: A New Dimension in Computer Data Security. John
Wiley & Sons (1982)
15. Kohl, J., Neuman, C.: The Kerberos Network Authentication Service (V5). Technical report,
RFC 1510, September 1993 (1993)
16. Gligor, V., Donescu, P.: Integrity-Aware PCBC Encryption Schemes. Security Protocols: 7th
International Workshop, Cambridge, Uk, April 19-21, 1999: Proceedings (2000)
17. Jutla, C.: Encryption modes with almost free message integrity. Advances in Cryptology–
EUROCRYPT 2045 (2001) 529–544
18. Gligor, V., Donescu, P.: Fast Encryption and Authentication: XCBC Encryption and XECB
Authentication Modes. Fast Software Encryption: 8th International Workshop, FSE 2001,
Yokohama, Japan, April 2-4, 2001: Revised Papers (2002)
19. Rogaway, P., Bellare, M., Black, J.: OCB: A Block-Cipher Mode of Operation for Efficient
Authenticated Encryption. ACM Trans. Inf. Syst. Secur. 6 (2003) 365–403
20. Ferguson, N., Whiting, D., Schneier, B., Kelsey, J., Lucks, S., Kohno, T.: Helix: Fast En-
cryption and Authentication in a Single Cryptographic Primitive, Fast Software Encryption
2003, LNCS 2887 (2003)
14