Standard form of authenticated encryption (AE) requires the ciphertext to be expanded by the nonce and the authentication tag. These expansions can be problematic when messages are relatively short and communication cost is high. To overcome the problem we propose a new form of AE scheme, MiniAE, which expands the ciphertext only by the single variable integrating nonce and tag. An important feature of MiniAE is that it requires the receiver to be stateful not only for detecting replays but also for detecting forgery of any type. McGrew and Foley already proposed a scheme having this feature, called AERO, however, there is no formal security guarantee based on the provable security framework. We provide a provable security analysis for Min...
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a no...
Authenticated encryption (AE) is used in a wide variety of applications, potentially in settings for...
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidential...
Abstract. Standard form of authenticated encryption (AE) requires the ciphertext to be expanded by t...
Authenticated encryption is a cryptographic mechanism that allows communicating parties to protect t...
The customary formulation of authenticated encryption (AE) requires the decrypting party to supply t...
We propose definitions and constructions of authenticated encryption (AE) schemes that offer securit...
Authenticated Encryption (AE) is a symmetric key cryptographic primitive that ensures confidentialit...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong no-tions ...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong notions o...
The first part of the paper explains the need for combining message encryption and authentication. W...
Abstract. With a scheme for robust authenticated-encryption a user can select an arbitrary value λ ≥...
In some wireless environments, minimizing the size of messages is paramount due to the resulting sig...
The size of the authentication tag represents a significant overhead for applications that are limit...
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a no...
Authenticated encryption (AE) is used in a wide variety of applications, potentially in settings for...
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidential...
Abstract. Standard form of authenticated encryption (AE) requires the ciphertext to be expanded by t...
Authenticated encryption is a cryptographic mechanism that allows communicating parties to protect t...
The customary formulation of authenticated encryption (AE) requires the decrypting party to supply t...
We propose definitions and constructions of authenticated encryption (AE) schemes that offer securit...
Authenticated Encryption (AE) is a symmetric key cryptographic primitive that ensures confidentialit...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong no-tions ...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong notions o...
The first part of the paper explains the need for combining message encryption and authentication. W...
Abstract. With a scheme for robust authenticated-encryption a user can select an arbitrary value λ ≥...
In some wireless environments, minimizing the size of messages is paramount due to the resulting sig...
The size of the authentication tag represents a significant overhead for applications that are limit...
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a no...
Authenticated encryption (AE) is used in a wide variety of applications, potentially in settings for...
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidential...