Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
ZMAC: a fast tweakable block cipher mode for highly secure message authentication
We propose a new mode of operation called ZMAC allowing to construct a (stateless and
deterministic) message authentication code (MAC) from a tweakable block cipher (TBC) …
deterministic) message authentication code (MAC) from a tweakable block cipher (TBC) …
Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption
This paper proposes an authenticated encryption scheme, called SIVx, that preserves BBB
security also in the case of unlimited nonce reuses. For this purpose, we propose a single …
security also in the case of unlimited nonce reuses. For this purpose, we propose a single …
Close to optimally secure variants of GCM
P Zhang, HG Hu, Q Yuan - Security and Communication …, 2018 - Wiley Online Library
The Galois/Counter Mode of operation (GCM) is a widely used nonce‐based authenticated
encryption with associated data mode which provides the birthday‐bound security in the …
encryption with associated data mode which provides the birthday‐bound security in the …
Small Stretch Problem of the DCT Scheme and How to Fix It
Y Chen, T Guo, L Hu, L Shang, S Mao… - Cryptology ePrint …, 2023 - eprint.iacr.org
DCT is a beyond-birthday-bound~(BBB) deterministic authenticated encryption~(DAE) mode
proposed by Forler et al. in ACISP 2016, ensuring integrity by redundancy. The instantiation …
proposed by Forler et al. in ACISP 2016, ensuring integrity by redundancy. The instantiation …
Universal Context Commitment without Ciphertext Expansion
A Bhattacharjee, R Bhaumik, C Dhar - Cryptology ePrint Archive, 2024 - eprint.iacr.org
An ongoing research challenge in symmetric cryptography is to design an authenticated
encryption (AE) with a commitment to the secret key or preferably to the entire context. One …
encryption (AE) with a commitment to the secret key or preferably to the entire context. One …
[PDF][PDF] Differential Cryptanalysis of Symmetric Primitives
M Eichlseder - 2018 - graz.elsevierpure.com
We cryptanalyze several symmetric encryption and hashing algorithms. A central factor in
the security of symmetric cryptographic algorithms is the resistance of their core building …
the security of symmetric cryptographic algorithms is the resistance of their core building …
[PDF][PDF] Authenticated Encryption Schemes: A Systematic
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
Compression Function Based Authenticated Encryption Mode for Big Data
P Zhang, Q Yuan - 2021 IEEE 6th International Conference on …, 2021 - ieeexplore.ieee.org
With the rise of big data, it is still an open problem to securely store and process large
amounts of data on lightweight devices. This paper focuses on the data security protection in …
amounts of data on lightweight devices. This paper focuses on the data security protection in …
[PDF][PDF] Design, Analysis, and Implementation of Symmetric-key (Authenticated) Ciphers
E List - 2021 - db-thueringen.de
Abstract Modern Cryptography. Modern cryptography has become an often ubiquitous but
essential part of our daily lives. Protocols for secure authentication and encryption protect …
essential part of our daily lives. Protocols for secure authentication and encryption protect …