International audienceAuthenticated encryption schemes which resist misuse of nonce at some desired level of privacy are two-pass or Macthen- Encrypt constructions (inherently inefficient but provide full privacy) and online constructions like McOE, sponge-type authenticated encryptions (such as duplex) and COPA. Only the last one is almost parallelizable except that for associated data processing, the final block-cipher call is sequential (it needs to wait for the encryption of all the previous ones). In this paper, we design a new online secure authenticated encryption, called ELmD or Encrypt-Linear mix-Decrypt, which is completely (two-stage) parallel (even in associated data) and fully pipeline implementable. It also provides full priva...
International audienceHardware security tokens have now been used for several decades to store crypt...
We describe a block-cipher mode of operation, EME, that turns an n-bit block cipher into a tweakable...
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a no...
International audienceAuthenticated encryption schemes which resist misuse of nonce at some desired ...
Abstract. The authenticated encryptions which resist misuse of initial value (or nonce) at some desi...
International audience—ELmD (Encrypt-Linear mix-Decrypt) is a block-cipher based efficient authentic...
Abstract. Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext block...
Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which on...
© International Association for Cryptologic Research 2015. We present a new, misuse-resistant scheme...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
Abstract. Encrypt-Mix-Encrypt is a type of SPRP based construction, where a masked plaintext is encr...
Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide both conf...
With the trend to connect more and more devices to the Internet, authenticated encryption has become...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong no-tions ...
Abstract. We propose a new authenticated encryption scheme PAEQ, which employs a fixed pub-lic permu...
International audienceHardware security tokens have now been used for several decades to store crypt...
We describe a block-cipher mode of operation, EME, that turns an n-bit block cipher into a tweakable...
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a no...
International audienceAuthenticated encryption schemes which resist misuse of nonce at some desired ...
Abstract. The authenticated encryptions which resist misuse of initial value (or nonce) at some desi...
International audience—ELmD (Encrypt-Linear mix-Decrypt) is a block-cipher based efficient authentic...
Abstract. Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext block...
Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which on...
© International Association for Cryptologic Research 2015. We present a new, misuse-resistant scheme...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
Abstract. Encrypt-Mix-Encrypt is a type of SPRP based construction, where a masked plaintext is encr...
Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide both conf...
With the trend to connect more and more devices to the Internet, authenticated encryption has become...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong no-tions ...
Abstract. We propose a new authenticated encryption scheme PAEQ, which employs a fixed pub-lic permu...
International audienceHardware security tokens have now been used for several decades to store crypt...
We describe a block-cipher mode of operation, EME, that turns an n-bit block cipher into a tweakable...
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a no...