Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidentiality and authenticity in the symmetric-key setting have existed for well over a decade. By all conventional measures, AES-OCB seems to be the AE algorithm of choice on any platform with AES-NI: it has a proof showing it is secure assuming AES is, and it is one of the fastest out of all such algorithms. However, algorithms such as AES-GCM and ChaCha20+Poly1305 have seen more widespread adoption, even though they will likely never outperform AES-OCB on platforms with AES-NI. Given the fact that changing algorithms is a long and costly process, some have set out to maximize the security that can be achieved with the already deployed algorithms, w...
In today's interconnected digital landscape, the protection of sensitive information is of great imp...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
peer reviewedWe propose a new authenticated encryption scheme PAEQ, which employs a fixed public per...
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption sc...
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme ...
In this paper, we describe and analyze the security of the AES-GCM-SIV mode of operation, as defined...
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme ...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong no-tions ...
Awareness of the significance of securing communication and data has increased dramatically due to t...
This technical note presents limits on the security (as a function of the number of plaintext bytes ...
GCM-SIV2 is a nonce-based beyond-birthday-bound (BBB)-secure authenticated encryption (AE) mode intr...
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption sc...
Abstract. With a scheme for robust authenticated-encryption a user can select an arbitrary value λ ≥...
The ChaCha20 stream cipher and the Poly1305 authenticator are cryptographic algorithms designed by D...
In today's interconnected digital landscape, the protection of sensitive information is of great imp...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
peer reviewedWe propose a new authenticated encryption scheme PAEQ, which employs a fixed public per...
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption sc...
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme ...
In this paper, we describe and analyze the security of the AES-GCM-SIV mode of operation, as defined...
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme ...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong no-tions ...
Awareness of the significance of securing communication and data has increased dramatically due to t...
This technical note presents limits on the security (as a function of the number of plaintext bytes ...
GCM-SIV2 is a nonce-based beyond-birthday-bound (BBB)-secure authenticated encryption (AE) mode intr...
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption sc...
Abstract. With a scheme for robust authenticated-encryption a user can select an arbitrary value λ ≥...
The ChaCha20 stream cipher and the Poly1305 authenticator are cryptographic algorithms designed by D...
In today's interconnected digital landscape, the protection of sensitive information is of great imp...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
peer reviewedWe propose a new authenticated encryption scheme PAEQ, which employs a fixed public per...