The COLM Authenticated Encryption Scheme
From MaRDI portal
Publication:6489331
Recommendations
- Misuse-resistant variants of the OMD authenticated encryption mode
- The \texttt{Deoxys} AEAD family
- Can CAESAR beat Galois? Robustness of CAESAR candidates against nonce reusing and high data complexity attacks
- Authenticated encryption with nonce misuse and physical leakage: definitions, separation results and first construction (extended abstract)
- Nonces are noticed: AEAD revisited
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 1842498 (Why is no real title available?)
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- How to securely release unverified plaintext in authenticated encryption
- McOE: a family of almost foolproof on-line authenticated encryption schemes
- Parallelizable and authenticated online ciphers
- The “Coefficients H” Technique
- Topics in Cryptology – CT-RSA 2004
This page was built for publication: The COLM Authenticated Encryption Scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6489331)