On modes of operations of a block cipher for authentication and authenticated encryption
From MaRDI portal
Publication:301626
DOI10.1007/s12095-015-0153-6zbMath1372.94415OpenAlexW1575650658WikidataQ123023586 ScholiaQ123023586MaRDI QIDQ301626
Palash Sarkar, Debrup Chakraborty
Publication date: 1 July 2016
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-015-0153-6
block cipherauthenticationauthenticated encryptionauthenticated encryption with associated datadeterministic authenticated encryption with associated dataGalois field masking
Related Items (3)
ON THE SECURITY OF AEAD-CRYPTOSYSTEM OF THE GCM TYPE ⋮ RIV for Robust Authenticated Encryption ⋮ \textsf{FAST}: disk encryption and beyond
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Fast software encryption. 16th international workshop, FSE 2009, Leuven, Belgium, February 22--25, 2009. Revised selected papers
- New hash functions and their use in authentication and set equality
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
- Improved Authenticity Bound of EAX, and Refinements
- Parallelizable and Authenticated Online Ciphers
- Another Look at Tightness
- Breaking and Repairing GCM Security Proofs
- Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET
- CLOC: Authenticated Encryption for Short Input
- COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse
- Pipelineable On-line Encryption
- Attacks on the Authenticated Encryption Mode of Operation <italic>PAE</italic>
- The Software Performance of Authenticated-Encryption Modes
- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
- Complete characterization of security notions for probabilistic private-key encryption
- Intel’s New AES Instructions for Enhanced Performance and Security
- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption
- On Fast and Provably Secure Message Authentication Based on Universal Hashing
- A Provable-Security Treatment of the Key-Wrap Problem
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption
- Codes Which Detect Deception
- McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
- Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher
- Stronger Security Bounds for Wegman-Carter-Shoup Authenticators
- Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
- Progress in Cryptology - INDOCRYPT 2003
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Fast Software Encryption
- Progress in Cryptology - INDOCRYPT 2004
- Fast Software Encryption
- Information Security and Cryptology
- Topics in Cryptology – CT-RSA 2004
- Fast Software Encryption
This page was built for publication: On modes of operations of a block cipher for authentication and authenticated encryption