Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
Breaking symmetric cryptosystems using quantum period finding
Due to Shor's algorithm, quantum computers are a severe threat for public key cryptography.
This motivated the cryptographic community to search for quantum-safe solutions. On the …
This motivated the cryptographic community to search for quantum-safe solutions. On the …
Boolean searchable symmetric encryption with worst-case sub-linear complexity
Recent work on searchable symmetric encryption (SSE) has focused on increasing its
expressiveness. A notable example is the OXT construction (Cash et al., CRYPTO'13) which …
expressiveness. A notable example is the OXT construction (Cash et al., CRYPTO'13) which …
Robust authenticated-encryption AEZ and the problem that it solves
With a scheme for robust authenticated-encryption a user can select an arbitrary value λ\! ≥
0 and then encrypt a plaintext of any length into a ciphertext that's λ characters longer. The …
0 and then encrypt a plaintext of any length into a ciphertext that's λ characters longer. The …
Counter-in-tweak: authenticated encryption modes for tweakable block ciphers
Abstract We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable
block cipher into a nonce-based authenticated encryption scheme (with associated data) …
block cipher into a nonce-based authenticated encryption scheme (with associated data) …
How to securely release unverified plaintext in authenticated encryption
Scenarios in which authenticated encryption schemes output decrypted plaintext before
successful verification raise many security issues. These situations are sometimes …
successful verification raise many security issues. These situations are sometimes …
Improved masking for tweakable blockciphers with applications to authenticated encryption
A popular approach to tweakable blockcipher design is via masking, where a certain
primitive (a blockcipher or a permutation) is preceded and followed by an easy-to-compute …
primitive (a blockcipher or a permutation) is preceded and followed by an easy-to-compute …
Blockcipher-based authenticated encryption: how small can we go?
This paper presents a lightweight blockcipher-based authenticated encryption mode mainly
focusing on minimizing the implementation size, ie, hardware gates or working memory on …
focusing on minimizing the implementation size, ie, hardware gates or working memory on …
Parallelizable rate-1 authenticated encryption from pseudorandom functions
K Minematsu - Advances in Cryptology–EUROCRYPT 2014: 33rd …, 2014 - Springer
This paper proposes a new scheme for authenticated encryption (AE) which is typically
realized as a blockcipher mode of operation. The proposed scheme has attractive features …
realized as a blockcipher mode of operation. The proposed scheme has attractive features …
Boosting authenticated encryption robustness with minimal modifications
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data
confidentiality and authenticity in the symmetric-key setting have existed for well over a …
confidentiality and authenticity in the symmetric-key setting have existed for well over a …