We describe a parallelizable block-cipher mode of operation that simultaneously provides privacy and authenticity. OCB encrypts-and-authenticates a nonempty string M ∈{0, 1} ∗ using ⌈|M|/n ⌉ + 2block-cipher invocations, where n is the block length of the underlying block cipher. Additional overhead is small. OCB refines a scheme, IAPM, suggested by Charanjit Jutla. Desirable properties of OCB include: the ability to encrypt a bit string of arbitrary length into a ciphertext of minimal length; cheap offset calculations; cheap key setup; a single underlying cryptographic key; no extended-precision addition; a nearly optimal number of block-cipher calls; and no requirement for a random IV. We prove OCB secure, quantifying the adversary’s abili...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
peer reviewedWe propose a new authenticated encryption scheme PAEQ, which employs a fixed public per...
peer reviewedWe propose a new authenticated encryption scheme PAEQ, which employs a fixed public per...
We describe a parallelizable block-cipher mode of operation that simultaneously provides ∗privacy an...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message a...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message ...
We define a new mode of operation for block ciphers which in addition to providing confidentiality a...
Graduation date: 2006Authenticated-Encryption modes of operation have recently received great atten-...
We propose a block-cipher mode of operation, EAX, for authenticated-encryption with associated-data ...
A nonce-respecting tweakable blockcipher is the building-block for the OCB authenticated encryption ...
OCB3 is one of the winners of the CAESAR competition and is among the mostpopular authenticated encr...
We present the eXtended Ciphertext Block Chaining (XCBC) schemes or modes of encryption that can det...
© International Association for Cryptologic Research 2015. We present a new, misuse-resistant scheme...
The OCB mode of operation for block ciphers has three variants, OCB1, OCB2 and OCB3. OCB1 and OCB3 c...
Abstract. We describe a block-cipher mode of operation, CMC, that turns an n-bit block cipher into a...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
peer reviewedWe propose a new authenticated encryption scheme PAEQ, which employs a fixed public per...
peer reviewedWe propose a new authenticated encryption scheme PAEQ, which employs a fixed public per...
We describe a parallelizable block-cipher mode of operation that simultaneously provides ∗privacy an...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message a...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message ...
We define a new mode of operation for block ciphers which in addition to providing confidentiality a...
Graduation date: 2006Authenticated-Encryption modes of operation have recently received great atten-...
We propose a block-cipher mode of operation, EAX, for authenticated-encryption with associated-data ...
A nonce-respecting tweakable blockcipher is the building-block for the OCB authenticated encryption ...
OCB3 is one of the winners of the CAESAR competition and is among the mostpopular authenticated encr...
We present the eXtended Ciphertext Block Chaining (XCBC) schemes or modes of encryption that can det...
© International Association for Cryptologic Research 2015. We present a new, misuse-resistant scheme...
The OCB mode of operation for block ciphers has three variants, OCB1, OCB2 and OCB3. OCB1 and OCB3 c...
Abstract. We describe a block-cipher mode of operation, CMC, that turns an n-bit block cipher into a...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
peer reviewedWe propose a new authenticated encryption scheme PAEQ, which employs a fixed public per...
peer reviewedWe propose a new authenticated encryption scheme PAEQ, which employs a fixed public per...