In Blockwise On-line Encryption, encryption and decryption return an output block as soon as the next input block is received. In this paper, we introduce Authenticated Streamwise On-line Encryption (ASOE), which operates on plaintexts and ciphertexts as streams of arbitrary length (as opposed to fixed-sized blocks), and thus significantly reduces message expansion and end-to-end latency. Also, ASOE provides data authenticity as an option. ASOE can therefore be used to efficiently secure resource-constrained communications with real-time requirements such as those in the electric power grid and wireless sensor networks. We investigate and formalize ASOE\u27s strongest achievable notion of security, and present a construction that is secure ...
International audienceMany generic constructions for building secure cryptosystems from primi-tives ...
Committing security has gained considerable attention in the field of authenticated encryption (AE)....
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
The common approach to defining secure channels in the literature is to consider transportation of d...
The goal of the modes of operation for authenticated encryption is to achieve faster encryption and ...
Real-world applications of authenticated encryption often require the encryption to be computable on...
Encryption is the primary tool for protecting information security, but cyber-physical systems that ...
International audienceIn this paper, we investigate the authenticated encryption paradigm, and its s...
Security is a major concern of the internet world because the development of the Internet requires t...
Abstract. Correct authenticated decryption requires the receiver to buffer the decrypted message unt...
Lightweight cryptography was developed in response to the increasing need to secure devices for the ...
Authenticated encryption schemes are usually expected to offer confidentiality and authenticity. In ...
Message authentication with low latency is necessary to ensure secure operations in legacy industria...
The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it adds latenc...
© International Association for Cryptologic Research 2014. Scenarios in which authenticated encrypti...
International audienceMany generic constructions for building secure cryptosystems from primi-tives ...
Committing security has gained considerable attention in the field of authenticated encryption (AE)....
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
The common approach to defining secure channels in the literature is to consider transportation of d...
The goal of the modes of operation for authenticated encryption is to achieve faster encryption and ...
Real-world applications of authenticated encryption often require the encryption to be computable on...
Encryption is the primary tool for protecting information security, but cyber-physical systems that ...
International audienceIn this paper, we investigate the authenticated encryption paradigm, and its s...
Security is a major concern of the internet world because the development of the Internet requires t...
Abstract. Correct authenticated decryption requires the receiver to buffer the decrypted message unt...
Lightweight cryptography was developed in response to the increasing need to secure devices for the ...
Authenticated encryption schemes are usually expected to offer confidentiality and authenticity. In ...
Message authentication with low latency is necessary to ensure secure operations in legacy industria...
The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it adds latenc...
© International Association for Cryptologic Research 2014. Scenarios in which authenticated encrypti...
International audienceMany generic constructions for building secure cryptosystems from primi-tives ...
Committing security has gained considerable attention in the field of authenticated encryption (AE)....
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...