Authenticated Encryption (AE) is a symmetric key cryptographic primitive that ensures confidentiality and authenticity of processed messages at the same time. The research of AE as a primitive in its own right started in 2000. The security goals of AE were captured in formal definitions in the tradition in the tradition of provable security (such as NAE, MRAE, OAE, RAE or the RUP), where the security of a scheme is formally proven assuming the security of an underlying building block. The prevailing syntax moved to nonce-based AE with associated data (which is an additional input that gets authenticated, but not encrypted). Other types of AE schemes appeared as well, e.g. ones that supported stateful sessions. Numerous AE schemes were desi...
Authenticated ciphers rely on the uniqueness of the nonces to meet their security goals. In this wor...
We propose definitions and constructions of authenticated encryption (AE) schemes that offer securit...
Abstract. Standard form of authenticated encryption (AE) requires the ciphertext to be expanded by t...
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as...
Real-world applications of authenticated encryption often require the encryption to be computable on...
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as...
Authenticated encryption is a cryptographic mechanism that allows communicating parties to protect t...
Standard form of authenticated encryption (AE) requires the ciphertext to be expanded by the nonce a...
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a no...
A definition of online authenticated-encryption (OAE), call it OAE1, was given by Fleischmann, Forle...
Abstract. A definition of online authenticated-encryption (OAE), call it OAE1, was given by Fleischm...
The customary formulation of authenticated encryption (AE) requires the decrypting party to supply t...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong no-tions ...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong notions o...
Authenticated encryption (AE) is used in a wide variety of applications, potentially in settings for...
Authenticated ciphers rely on the uniqueness of the nonces to meet their security goals. In this wor...
We propose definitions and constructions of authenticated encryption (AE) schemes that offer securit...
Abstract. Standard form of authenticated encryption (AE) requires the ciphertext to be expanded by t...
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as...
Real-world applications of authenticated encryption often require the encryption to be computable on...
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as...
Authenticated encryption is a cryptographic mechanism that allows communicating parties to protect t...
Standard form of authenticated encryption (AE) requires the ciphertext to be expanded by the nonce a...
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a no...
A definition of online authenticated-encryption (OAE), call it OAE1, was given by Fleischmann, Forle...
Abstract. A definition of online authenticated-encryption (OAE), call it OAE1, was given by Fleischm...
The customary formulation of authenticated encryption (AE) requires the decrypting party to supply t...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong no-tions ...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong notions o...
Authenticated encryption (AE) is used in a wide variety of applications, potentially in settings for...
Authenticated ciphers rely on the uniqueness of the nonces to meet their security goals. In this wor...
We propose definitions and constructions of authenticated encryption (AE) schemes that offer securit...
Abstract. Standard form of authenticated encryption (AE) requires the ciphertext to be expanded by t...