Real-world applications of authenticated encryption often require the encryption to be computable online, e.g. to compute the ith block of ciphertext after having processed the first i blocks of plaintext. A significant line of research was dedicated to identifying security notions for online authenticated encryption schemes, that capture various security goals related to real-life scenarios. Fouque, Joux, Martinet and Valette proposed definitions of privacy and integrity against adversaries that can query their oracles in a blockwise-adaptive manner, to model memory-constrained applications. A decade later, Fleischmann, Forler and Lucks proposed the notion of online nonce misuse-resistant authenticated encryption (OAE) to capture the secur...
© International Association for Cryptologic Research 2014. Scenarios in which authenticated encrypti...
When a message is transformed into a ciphertext in a way designed to protect both its privacy and au...
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a no...
Real-world applications of authenticated encryption often require the encryption to be computable on...
A definition of online authenticated-encryption (OAE), call it OAE1, was given by Fleischmann, Forle...
Abstract. A definition of online authenticated-encryption (OAE), call it OAE1, was given by Fleischm...
Abstract. On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line...
International audienceIn this paper, we investigate the authenticated encryption paradigm, and its s...
Abstract. Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext block...
© International Association for Cryptologic Research 2015. We present a new, misuse-resistant scheme...
We propose definitions and constructions of authenticated encryption (AE) schemes that offer securit...
CAESAR has caused a heated discussion regarding the merits of one-pass encryption and online ciphers...
Awareness of the significance of securing communication and data has increased dramatically due to t...
Leakage resilience (LR) and misuse resistance (MR) are two important properties for the deployment o...
Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which on...
© International Association for Cryptologic Research 2014. Scenarios in which authenticated encrypti...
When a message is transformed into a ciphertext in a way designed to protect both its privacy and au...
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a no...
Real-world applications of authenticated encryption often require the encryption to be computable on...
A definition of online authenticated-encryption (OAE), call it OAE1, was given by Fleischmann, Forle...
Abstract. A definition of online authenticated-encryption (OAE), call it OAE1, was given by Fleischm...
Abstract. On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line...
International audienceIn this paper, we investigate the authenticated encryption paradigm, and its s...
Abstract. Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext block...
© International Association for Cryptologic Research 2015. We present a new, misuse-resistant scheme...
We propose definitions and constructions of authenticated encryption (AE) schemes that offer securit...
CAESAR has caused a heated discussion regarding the merits of one-pass encryption and online ciphers...
Awareness of the significance of securing communication and data has increased dramatically due to t...
Leakage resilience (LR) and misuse resistance (MR) are two important properties for the deployment o...
Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which on...
© International Association for Cryptologic Research 2014. Scenarios in which authenticated encrypti...
When a message is transformed into a ciphertext in a way designed to protect both its privacy and au...
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a no...