Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

Breaking symmetric cryptosystems using quantum period finding

M Kaplan, G Leurent, A Leverrier… - Advances in Cryptology …, 2016 - Springer
Due to Shor's algorithm, quantum computers are a severe threat for public key cryptography.
This motivated the cryptographic community to search for quantum-safe solutions. On the …

Boolean searchable symmetric encryption with worst-case sub-linear complexity

S Kamara, T Moataz - Advances in Cryptology–EUROCRYPT 2017: 36th …, 2017 - Springer
Recent work on searchable symmetric encryption (SSE) has focused on increasing its
expressiveness. A notable example is the OXT construction (Cash et al., CRYPTO'13) which …

Robust authenticated-encryption AEZ and the problem that it solves

VT Hoang, T Krovetz, P Rogaway - … on the Theory and Applications of …, 2015 - Springer
With a scheme for robust authenticated-encryption a user can select an arbitrary value λ\! ≥
0 and then encrypt a plaintext of any length into a ciphertext that's λ characters longer. The …

Counter-in-tweak: authenticated encryption modes for tweakable block ciphers

T Peyrin, Y Seurin - Annual International Cryptology Conference, 2016 - Springer
Abstract We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable
block cipher into a nonce-based authenticated encryption scheme (with associated data) …

How to securely release unverified plaintext in authenticated encryption

E Andreeva, A Bogdanov, A Luykx, B Mennink… - … Conference on the …, 2014 - Springer
Scenarios in which authenticated encryption schemes output decrypted plaintext before
successful verification raise many security issues. These situations are sometimes …

Improved masking for tweakable blockciphers with applications to authenticated encryption

R Granger, P Jovanovic, B Mennink… - … Conference on the Theory …, 2016 - Springer
A popular approach to tweakable blockcipher design is via masking, where a certain
primitive (a blockcipher or a permutation) is preceded and followed by an easy-to-compute …

Blockcipher-based authenticated encryption: how small can we go?

A Chakraborti, T Iwata, K Minematsu, M Nandi - Journal of Cryptology, 2020 - Springer
This paper presents a lightweight blockcipher-based authenticated encryption mode mainly
focusing on minimizing the implementation size, ie, hardware gates or working memory on …

Parallelizable rate-1 authenticated encryption from pseudorandom functions

K Minematsu - Advances in Cryptology–EUROCRYPT 2014: 33rd …, 2014 - Springer
This paper proposes a new scheme for authenticated encryption (AE) which is typically
realized as a blockcipher mode of operation. The proposed scheme has attractive features …

Boosting authenticated encryption robustness with minimal modifications

T Ashur, O Dunkelman, A Luykx - … , Santa Barbara, CA, USA, August 20 …, 2017 - Springer
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data
confidentiality and authenticity in the symmetric-key setting have existed for well over a …