A New Mode of Operation for Incremental Authenticated Encryption with Associated Data
From MaRDI portal
Publication:2807224
DOI10.1007/978-3-319-31301-6_23zbMATH Open1396.94097OpenAlexW2419648115MaRDI QIDQ2807224FDOQ2807224
Authors: Yu Sasaki, Kan Yasuda
Publication date: 19 May 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-31301-6_23
Recommendations
- The \(\mathsf{mF}\) mode of authenticated encryption with associated data
- A novel authenticated encryption scheme and its extension
- How to incorporate associated data in sponge-based authenticated encryption
- Analysis and improvement of an authentication scheme in incremental cryptography
- Incremental deterministic public-key encryption
- Incremental Deterministic Public-Key Encryption
- The counter mode with encrypted nonces and its extension to authenticated encryption
- Incremental Unforgeable Encryption
- A new threshold-authenticated encryption scheme
- Authenticated and misuse-resistant encryption of key-dependent data
Cites Work
- Progress in Cryptology - INDOCRYPT 2004
- Title not available (Why is that?)
- Parallelizable and authenticated online ciphers
- The software performance of authenticated-encryption modes
- Title not available (Why is that?)
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Title not available (Why is that?)
- How to securely release unverified plaintext in authenticated encryption
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- Title not available (Why is that?)
- Fast Software Encryption
- Incremental Unforgeable Encryption
- PAEQ: parallelizable permutation-based authenticated encryption
Cited In (7)
- Analysis and improvement of an authentication scheme in incremental cryptography
- IQRA: Incremental Quadratic Re-keying friendly Authentication scheme
- $\mathsf{sMGM}$: parameterizable AEAD mode
- Incremental Unforgeable Encryption
- Near birthday attack on ``8 bits AEAD mode
- Incremental cryptography revisited: PRFs, nonces and modular design
- Fast Software Encryption
Uses Software
This page was built for publication: A New Mode of Operation for Incremental Authenticated Encryption with Associated Data
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2807224)