Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which only depend on the preceding plaintext blocks. All online ciphers proposed so far are essentially serial, which significantly limits their performance on parallel architectures such as modern general-purpose CPUs or dedicated hardware.We propose the first parallelizable online cipher, COPE. It performs two calls to the underlying block cipher per plaintext block and is fully parallelizable in both encryption and decryption. COPE is proven secure against chosenplaintext attacks assuming the underlying block cipher is a strong PRP. We then extend COPE to create COPA, the first parallelizable, online authenticated cipher with nonce-misuse resistan...
Real-world applications of authenticated encryption often require the encryption to be computable on...
Encryption is being used more than ever before. It is used to prevent eavesdropping on our communica...
A totally involutional, highly scalable PP-1 cipher is proposed, evaluated and discussed. Having ver...
Abstract. Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext block...
© International Association for Cryptologic Research 2015. We present a new, misuse-resistant scheme...
CAESAR has caused a heated discussion regarding the merits of one-pass encryption and online ciphers...
Abstract. The authenticated encryptions which resist misuse of initial value (or nonce) at some desi...
Abstract. Authenticated encryption (AE) has recently gained renewed interest due to the ongoing CAES...
International audienceAuthenticated encryption schemes which resist misuse of nonce at some desired ...
Abstract. CAESAR has caused a heated discussion regarding the merits of one-pass encryption and onli...
Abstract. Correct authenticated decryption requires the receiver to buffer the decrypted message unt...
Abstract- By exploring different granularities of data-level and task-level parallelism, we map 4 im...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
We describe a parallelizable block-cipher mode of operation that simultaneously provides ∗privacy an...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message ...
Real-world applications of authenticated encryption often require the encryption to be computable on...
Encryption is being used more than ever before. It is used to prevent eavesdropping on our communica...
A totally involutional, highly scalable PP-1 cipher is proposed, evaluated and discussed. Having ver...
Abstract. Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext block...
© International Association for Cryptologic Research 2015. We present a new, misuse-resistant scheme...
CAESAR has caused a heated discussion regarding the merits of one-pass encryption and online ciphers...
Abstract. The authenticated encryptions which resist misuse of initial value (or nonce) at some desi...
Abstract. Authenticated encryption (AE) has recently gained renewed interest due to the ongoing CAES...
International audienceAuthenticated encryption schemes which resist misuse of nonce at some desired ...
Abstract. CAESAR has caused a heated discussion regarding the merits of one-pass encryption and onli...
Abstract. Correct authenticated decryption requires the receiver to buffer the decrypted message unt...
Abstract- By exploring different granularities of data-level and task-level parallelism, we map 4 im...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
We describe a parallelizable block-cipher mode of operation that simultaneously provides ∗privacy an...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message ...
Real-world applications of authenticated encryption often require the encryption to be computable on...
Encryption is being used more than ever before. It is used to prevent eavesdropping on our communica...
A totally involutional, highly scalable PP-1 cipher is proposed, evaluated and discussed. Having ver...