Voir la notice de l'article provenant de la source Math-Net.Ru
[1] M. Bellare, P. Rogaway, D. Wagner, “The EAX mode of operation”, FSE 2004, Lect. Notes Comput. Sci., 3017, 2004, 389–407 | DOI | Zbl
[2] CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness, , 2014 http://competitions.cr.yp.to/caesar.html
[3] 802.11-2016 - IEEE Standard for Information technology - Telecommunications and information exchange between systems. Local and metropolitan area networks - Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, , 14 Dec. 2016 https://ieeexplore.ieee.org/document/7786995/
[4] Information technology. Cryptographic protection of information. Block cipher modes of operation. GOST R 34.13-2015, STANDARTINFORM, M., 2016 (in Russian)
[5] J. Jonsson, “On the security of CTR + CBC-MAC”, SAC 2002, Lect. Notes Comput. Sci., 2595, 2003, 76–93 | DOI | MR | Zbl
[6] E. Rescorla, The transport layer security (TLS) protocol version 1.3, RFC, 8446, Internet Engineering Task Force (IETF), August 2018, 160 pp. https://tools.ietf.org/html/rfc8446
[7] P. Rogaway, T. Shrimpton, “A provable-security treatment of the key-wrap problem”, EUROCRYPT 2006, Lect. Notes Comput. Sci., 4004, 2006, 373–390 | DOI | MR | Zbl
[8] T. Shrimpton, A characterization of authenticated-encryption as a form of chosen-ciphertext security, Report 2004/272, , IACR ePrint Archive, 2004, 7 pp. https://eprint.iacr.org/2004/272.pdf
[9] D. Whiting, R. Housley, N. Ferguson, Counter with CBC-MAC (CCM), RFC, 3610, Internet Engineering Task Force (IETF), September 2003, 26 pp. http://tools.ietf.org/html/rfc3610 | Zbl