Abstract. Correct authenticated decryption requires the receiver to buffer the decrypted message until the authenticity check has been per-formed. In high-speed networks, which must handle large message frames at low latency, this behavior becomes practically infeasible. This paper proposes CCA-secure on-line ciphers as a practical alternative to AE schemes since the former provide some defense against malicious mes-sage modifications. Unfortunately, all published on-line ciphers so far are either inherently sequential, or lack a CCA-security proof. This paper introduces POE, a family of on-line ciphers that combines provable security against chosen-ciphertext attacks with pipelineability to support efficient implementations. POE combines a...
Abstract. The authenticated encryptions which resist misuse of initial value (or nonce) at some desi...
Abstract. With a scheme for robust authenticated-encryption a user can select an arbitrary value λ ≥...
Abstract. In this short article, we describe a very practical and simple attack on the au-thenticati...
Abstract. Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext block...
Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which on...
Abstract We initiate a study of on-line ciphers. These are ciphers that can take input plaintexts of...
International audienceIn this paper, we investigate the authenticated encryption paradigm, and its s...
Abstract. On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line...
Abstract. Authenticated encryption (AE) has recently gained renewed interest due to the ongoing CAES...
International audienceAuthenticated encryption schemes which resist misuse of nonce at some desired ...
Abstract. In this paper we introduce the first authenticated encryption scheme based on a hash funct...
In many applications where encrypted traffic flows from an open (public) domain to a protected (priv...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong no-tions ...
In Blockwise On-line Encryption, encryption and decryption return an output block as soon as the nex...
In many applications, where encrypted traffic flows from an open (public) domain to a protected (pri...
Abstract. The authenticated encryptions which resist misuse of initial value (or nonce) at some desi...
Abstract. With a scheme for robust authenticated-encryption a user can select an arbitrary value λ ≥...
Abstract. In this short article, we describe a very practical and simple attack on the au-thenticati...
Abstract. Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext block...
Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which on...
Abstract We initiate a study of on-line ciphers. These are ciphers that can take input plaintexts of...
International audienceIn this paper, we investigate the authenticated encryption paradigm, and its s...
Abstract. On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line...
Abstract. Authenticated encryption (AE) has recently gained renewed interest due to the ongoing CAES...
International audienceAuthenticated encryption schemes which resist misuse of nonce at some desired ...
Abstract. In this paper we introduce the first authenticated encryption scheme based on a hash funct...
In many applications where encrypted traffic flows from an open (public) domain to a protected (priv...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong no-tions ...
In Blockwise On-line Encryption, encryption and decryption return an output block as soon as the nex...
In many applications, where encrypted traffic flows from an open (public) domain to a protected (pri...
Abstract. The authenticated encryptions which resist misuse of initial value (or nonce) at some desi...
Abstract. With a scheme for robust authenticated-encryption a user can select an arbitrary value λ ≥...
Abstract. In this short article, we describe a very practical and simple attack on the au-thenticati...