Abstract We initiate a study of on-line ciphers. These are ciphers that can take input plaintexts oflarge and varying lengths and will output the ith block of the ciphertext after having processedonly the first i blocks of the plaintext. Such ciphers permit length-preserving encryption of adata stream with only a single pass through the data. We provide security definitions for this primitive and study its basic properties. We then provide attacks on some possible candidates,including CBC with fixed IV. We then provide two constructions, HCBC1 and HCBC2, basedon a given block cipher E and a family of computationally AXU functions. HCBC1 is provensecure against chosen-plaintext attacks assuming that E is a PRP secure against chosen-plaintext...
Abstract—This paper considers iterated hash functions. It pro-poses new constructions of fast and se...
International audienceThe majority of current attacks on reduced-round variants of block ciphers see...
This paper considers arbitrary-length chosen-ciphertext secure asymmetric encryption, thus addressi...
International audienceIn this paper, we investigate the authenticated encryption paradigm, and its s...
In Crypto 2001, Bellare et al. [1] introduced online cipher (or online permutation) and proposed two...
CAESAR has caused a heated discussion regarding the merits of one-pass encryption and online ciphers...
This paper reviews constructions of hash functions and MAC algorithms based on block ciphers. It dis...
© Springer-Verlag Berlin Heidelberg 1994. Constructions for hash functions baaed on a block cipher a...
Abstract. Correct authenticated decryption requires the receiver to buffer the decrypted message unt...
Abstract. Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext block...
Abstract. CAESAR has caused a heated discussion regarding the merits of one-pass encryption and onli...
We present a new encryption mode for block ciphers. The mode is efficient and is secure against chos...
Abstract. We motivate and describe a mode of operation HEM (resp., THEM) that turns a n-bit blockcip...
We invesitgate how to construct ciphers which operate on messages of various (and effectively arbitr...
Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which on...
Abstract—This paper considers iterated hash functions. It pro-poses new constructions of fast and se...
International audienceThe majority of current attacks on reduced-round variants of block ciphers see...
This paper considers arbitrary-length chosen-ciphertext secure asymmetric encryption, thus addressi...
International audienceIn this paper, we investigate the authenticated encryption paradigm, and its s...
In Crypto 2001, Bellare et al. [1] introduced online cipher (or online permutation) and proposed two...
CAESAR has caused a heated discussion regarding the merits of one-pass encryption and online ciphers...
This paper reviews constructions of hash functions and MAC algorithms based on block ciphers. It dis...
© Springer-Verlag Berlin Heidelberg 1994. Constructions for hash functions baaed on a block cipher a...
Abstract. Correct authenticated decryption requires the receiver to buffer the decrypted message unt...
Abstract. Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext block...
Abstract. CAESAR has caused a heated discussion regarding the merits of one-pass encryption and onli...
We present a new encryption mode for block ciphers. The mode is efficient and is secure against chos...
Abstract. We motivate and describe a mode of operation HEM (resp., THEM) that turns a n-bit blockcip...
We invesitgate how to construct ciphers which operate on messages of various (and effectively arbitr...
Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which on...
Abstract—This paper considers iterated hash functions. It pro-poses new constructions of fast and se...
International audienceThe majority of current attacks on reduced-round variants of block ciphers see...
This paper considers arbitrary-length chosen-ciphertext secure asymmetric encryption, thus addressi...