Authenticated encryption: Relations among notions and analysis of the generic composition paradigm

M Bellare, C Namprempre - International Conference on the Theory and …, 2000 - Springer
We consider two possible notions of authenticity for symmetric encryption schemes, namely
integrity of plaintexts and integrity of ciphertexts, and relate them to the standard notions of …

OCB: A block-cipher mode of operation for efficient authenticated encryption

P Rogaway, M Bellare, J Black - ACM Transactions on Information and …, 2003 - dl.acm.org
We describe a parallelizable block-cipher mode of operation that simultaneously provides
privacy and authenticity. OCB encrypts-and-authenticates a nonempty string M∈{0, 1} …

The software performance of authenticated-encryption modes

T Krovetz, P Rogaway - … : 18th International Workshop, FSE 2011, Lyngby …, 2011 - Springer
We study software performance of authenticated-encryption modes CCM, GCM, and OCB.
Across a variety of platforms, we find OCB to be substantially faster than either alternative …

Encryption modes with almost free message integrity

CS Jutla - International conference on the theory and applications …, 2001 - Springer
We define a new mode of operation for block encryption which in addition to assuring
confidentiality also assures message integrity. In contrast, previously for message integrity a …

Critical perspectives on provable security: Fifteen years of" another look" papers

N Koblitz, A Menezes - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Contents Page 1 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …

Parallelizable authentication trees

WE Hall, CS Jutla - Selected Areas in Cryptography: 12th International …, 2006 - Springer
We define a new authentication tree in the symmetric key setting, which has the same
computational time, storage and security parameters as the well known Merkle …

[PDF][PDF] Authenticated Encryption.

J Black - 2005 - Citeseer
Background. Throughout this article we will consider the AE problem in the “symmetric-key
model.” This means that we assume our two communicating parties, traditionally called …

Encryption modes with almost free message integrity

CS Jutla - Journal of Cryptology, 2008 - Springer
We define a new mode of operation for block ciphers which, in addition to providing
confidentiality, also ensures message integrity. In contrast, previously for message integrity a …

Incremental unforgeable encryption

E Buonanno, J Katz, M Yung - International Workshop on Fast Software …, 2001 - Springer
The recent selection of the AES block cipher to replace DES has generated interest in
developing new modes of operation to supplement the modes defined as part of the DES …

[PDF][PDF] OCB (v1. 1)

T Krovetz, P Rogaway - Submission to the CAESAR …, 2016 - competitions.cr.yp.to
OCB (v1.1) Page 1 OCB (v1.1) Submitted and designed by Ted Krovetz and Phillip Rogaway
ted@krovetz.net 15 September 2016 Here OCB means the algorithm of RFC 7253 [1]. Rather …