Abstract. The authenticated encryptions which resist misuse of initial value (or nonce) at some desired level of privacy are two-pass or Mac-then-Encrypt constructions (inherently inefficient but provide full pri-vacy) and online constructions, e.g., McOE, sponge-type authenticated encryptions (such as duplex, AEGIS) and COPA. Only the last one is almost parallelizable with some bottleneck in processing associated data. In this paper, we design a new online secure authenticated encryption, called ELmE or Encrypt-Linear mix-Encrypt, which is completely (two-stage) parallel (even in associated data) and pipeline implementable. It also provides full privacy when associated data (which includes initial value) is not repeated. The basic idea of ...
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidential...
Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide both conf...
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a no...
International audienceAuthenticated encryption schemes which resist misuse of nonce at some desired ...
Abstract. Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext block...
Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which on...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
© International Association for Cryptologic Research 2015. We present a new, misuse-resistant scheme...
Abstract. Encrypt-Mix-Encrypt is a type of SPRP based construction, where a masked plaintext is encr...
With the trend to connect more and more devices to the Internet, authenticated encryption has become...
Abstract. We propose a new authenticated encryption scheme PAEQ, which employs a fixed pub-lic permu...
We describe a block-cipher mode of operation, EME, that turns an n-bit block cipher into a tweakable...
Abstract. Authenticated encryption (AE) has recently gained renewed interest due to the ongoing CAES...
International audience—ELmD (Encrypt-Linear mix-Decrypt) is a block-cipher based efficient authentic...
Real-world applications of authenticated encryption often require the encryption to be computable on...
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidential...
Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide both conf...
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a no...
International audienceAuthenticated encryption schemes which resist misuse of nonce at some desired ...
Abstract. Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext block...
Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which on...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
© International Association for Cryptologic Research 2015. We present a new, misuse-resistant scheme...
Abstract. Encrypt-Mix-Encrypt is a type of SPRP based construction, where a masked plaintext is encr...
With the trend to connect more and more devices to the Internet, authenticated encryption has become...
Abstract. We propose a new authenticated encryption scheme PAEQ, which employs a fixed pub-lic permu...
We describe a block-cipher mode of operation, EME, that turns an n-bit block cipher into a tweakable...
Abstract. Authenticated encryption (AE) has recently gained renewed interest due to the ongoing CAES...
International audience—ELmD (Encrypt-Linear mix-Decrypt) is a block-cipher based efficient authentic...
Real-world applications of authenticated encryption often require the encryption to be computable on...
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidential...
Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide both conf...
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a no...