OCB: A block-cipher mode of operation for efficient authenticated encryption

P Rogaway, M Bellare, J Black - ACM Transactions on Information and …, 2003 - dl.acm.org
We describe a parallelizable block-cipher mode of operation that simultaneously provides
privacy and authenticity. OCB encrypts-and-authenticates a nonempty string M∈{0, 1} …

The order of encryption and authentication for protecting communications (or: How secure is SSL?)

H Krawczyk - Annual International Cryptology Conference, 2001 - Springer
We study the question of how to generically compose symmetric encryption and
authentication when building “secure channels” for the protection of communications over …

A simple and generic construction of authenticated encryption with associated data

P Sarkar - ACM Transactions on Information and System Security …, 2010 - dl.acm.org
We revisit the problem of constructing a protocol for performing Authenticated Encryption
with Associated Data (AEAD). A technique is described which combines a collision-resistant …

Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition

F Zhang, Z Liang, B Yang, X Zhao, S Guo… - Frontiers of Information …, 2018 - Springer
Abstract The Competition for Authenticated Encryption: Security, Applicability, and
Robustness (CAESAR) supported by the National Institute of Standards and Technology …

[PDF][PDF] New methods in hard disk encryption

C Fruhwirth - 2005 - docs.huihoo.com
This work investigates the state of the art in hard disk cryptography. As the choice of the
cipher mode is essential for the security of hard disk data, we discuss the recent cipher …

Pseudo-random functions and parallelizable modes of operations of a block cipher

P Sarkar - IEEE Transactions on Information Theory, 2010 - ieeexplore.ieee.org
A general result is proved for constructions which use a pseudo-random function (PRF) with
a “small” domain to build a PRF with a “large” domain. This result is used to analyse a new …

Compatible design of CCMP and OCB AES cipher using separated encryptor and decryptor for IEEE 802.11 i

HY Jang, JH Shim, JH Suk, IC Hwang… - … Symposium on Circuits …, 2004 - ieeexplore.ieee.org
We propose a compatible design of CCMP and OCB AES cipher using separated encryptor
and decryptor for IEEE 802.11 i. IEEE 802.11 i-wireless LAN security working group-CCMP …

Safety/Security Co-design for Automotive CAN Buses

MSM Zhang - 2024 - monarch.qucosa.de
Abstract (EN) The automotive industry heavily relies on the controller area network (CAN)
due to its low cost and robustness. However, as vehicle connectivity grows, CAN buses …

[PDF][PDF] Performance of authenticated encryption for payment cards with crypto co-processors

K Mayes - Proc of ICONS17, 2017 - academia.edu
Many security protocols rely on authentication of communicating entities and encryption of
exchanged data. Traditionally, authentication and encryption have been separate …

[PDF][PDF] Avaliaçao de desempenho de mecanismos de segurança para redes de sensores sem fio

MT Cavalcante, FP Garcia… - XXX Simpósio Brasileiro …, 2012 - researchgate.net
O crescimento do número de aplicações para Redes de Sensores sem Fio (RSSF) bem
como a diversificação das mesmas fez com que a segurança da informação nesse tipo de …