Chris J. Mitchell (2007) Cryptanalysis of the EPBC authenticated encryption mode.
Full text access: Open
Agenda - Introduction - Simultaneous confidentiality and integrity - Attacking EPBC - Completing the attack
This is a Published version This version's date is: 08/08/2007 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/d10c304e-b73f-b565-7849-9fd8b8837732/1/
Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010