Filters








2,768 Hits in 7.3 sec

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm

Mihir Bellare, Chanathip Namprempre
<span title="2008-07-30">2008</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7jmi32x7o5hfnpkgh2irnuqpim" style="color: black;">Journal of Cryptology</a> </i> &nbsp;
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-008-9026-x">doi:10.1007/s00145-008-9026-x</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/m6wxaarwbjgbzpyvgxgq2qgmem">fatcat:m6wxaarwbjgbzpyvgxgq2qgmem</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20030411174418/http://www.cs.ucsd.edu:80/users/mihir/papers/oem.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f4/d4/f4d414dc5f6d60928e2df97222d163843ba373db.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-008-9026-x"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm [chapter]

Mihir Bellare, Chanathip Namprempre
<span title="">2000</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-44448-3_41">doi:10.1007/3-540-44448-3_41</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/a7hkqvadfjbllnsp4jas4ainva">fatcat:a7hkqvadfjbllnsp4jas4ainva</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20030411174418/http://www.cs.ucsd.edu:80/users/mihir/papers/oem.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f4/d4/f4d414dc5f6d60928e2df97222d163843ba373db.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-44448-3_41"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Authenticated encryption in SSH

Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre
<span title="">2002</span> <i title="ACM Press"> Proceedings of the 9th ACM conference on Computer and communications security - CCS &#39;02 </i> &nbsp;
We believe that our new notions of privacy and integrity for encryption schemes with stateful decryption algorithms will be of independent interest.  ...  The Secure Shell (SSH) protocol is one of the most popular cryptographic protocols on the Internet. Unfortunately, the current SSH authenticated encryption mechanism is insecure.  ...  Acknowledgments We thank Alexandra Boldyreva, Gregory Neven, Adriana Palacio, Bill Sommerfeld, and David Wagner for commenting on an earlier version of this paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/586111.586112">doi:10.1145/586111.586112</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4nndki2vibav7no6v26vym3x24">fatcat:4nndki2vibav7no6v26vym3x24</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20060830034138/http://www-cse.ucsd.edu:80/users/mihir/papers/ssh.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a7/9c/a79c2ebb0e5a74ac06999feffcefe83aeabce8a9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/586111.586112"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Authenticated encryption in SSH

Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre
<span title="">2002</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 9th ACM conference on Computer and communications security - CCS &#39;02</a> </i> &nbsp;
We believe that our new notions of privacy and integrity for encryption schemes with stateful decryption algorithms will be of independent interest.  ...  The Secure Shell (SSH) protocol is one of the most popular cryptographic protocols on the Internet. Unfortunately, the current SSH authenticated encryption mechanism is insecure.  ...  Acknowledgments We thank Alexandra Boldyreva, Gregory Neven, Adriana Palacio, Bill Sommerfeld, and David Wagner for commenting on an earlier version of this paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/586110.586112">doi:10.1145/586110.586112</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/BellareKN02.html">dblp:conf/ccs/BellareKN02</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/44fxpb2jmbeydai74tdi5xfcta">fatcat:44fxpb2jmbeydai74tdi5xfcta</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20060830034138/http://www-cse.ucsd.edu:80/users/mihir/papers/ssh.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a7/9c/a79c2ebb0e5a74ac06999feffcefe83aeabce8a9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/586110.586112"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Indifferentiable Authenticated Encryption [chapter]

Manuel Barbosa, Pooya Farshim
<span title="">2018</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We study Authenticated Encryption with Associated Data (AEAD) from the viewpoint of composition in arbitrary (single-stage) environments.  ...  We show, on the negative side, that generic composition (in many of its configurations) and well-known classical and recent schemes fail to achieve indifferentiability.  ...  Acknowledgments The authors would like to thank Phillip Rogaway, Martijn Stam, and Stefano Tessaro for their comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-96884-1_7">doi:10.1007/978-3-319-96884-1_7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/r7x75bhhkbfzvdbwexayieynq4">fatcat:r7x75bhhkbfzvdbwexayieynq4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200507213611/http://eprints.whiterose.ac.uk/153479/1/2018_547.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/25/db/25dbab73a85668af1812783acd0113ed1aa6d583.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-96884-1_7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Reforgeability of Authenticated Encryption Schemes [chapter]

Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
<span title="">2017</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
This work pursues the idea of multi-forgery attacks as introduced  ...  Section 4 presents the j-IV-CA, a generic security analysis, and categorization of authenticated encryption schemes regarding to the introduced classes.  ...  Introduction (Nonce-Based) Authenticated Encryption. Simultaneously protecting authenticity and privacy of messages is the goal of authenticated encryption (AE) schemes.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-59870-3_2">doi:10.1007/978-3-319-59870-3_2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6f2izpaeezd5rcbk476qjqskdi">fatcat:6f2izpaeezd5rcbk476qjqskdi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170710050054/http://eprint.iacr.org/2017/332.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8f/55/8f558b9b4fbc2d7bbbeba6928b5b96c8fc8deda3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-59870-3_2"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

The State of the Authenticated Encryption

Damian Vizár
<span title="2016-09-01">2016</span> <i title="Walter de Gruyter GmbH"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ndvm4yozfbhtvjxfiowlwtdbty" style="color: black;">Tatra Mountains Mathematical Publications</a> </i> &nbsp;
The notion of authenticated encryption marries these two security goals in a single symmetric-key, cryptographic primitive.  ...  Ensuring confidentiality and integrity of communication remains among the most important goals of cryptography.  ...  designs and one generic composition method).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1515/tmmp-2016-0038">doi:10.1515/tmmp-2016-0038</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vnvjfj73yvff7ovjqagtwdpena">fatcat:vnvjfj73yvff7ovjqagtwdpena</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190502142907/https://content.sciendo.com/downloadpdf/journals/tmmp/67/1/article-p167.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ef/b1/efb125a6e3378e1d1d68bd998716a17d77b7a266.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1515/tmmp-2016-0038"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> degruyter.com </button> </a>

Breaking and provably repairing the SSH authenticated encryption scheme

Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre
<span title="2004-05-01">2004</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/trn6le535rfr5ma6j7pf3fegae" style="color: black;">ACM Transactions on Privacy and Security</a> </i> &nbsp;
We believe that our new notions of privacy and integrity for encryption schemes with stateful decryption algorithms will be of independent interest.  ...  The Secure Shell (SSH) protocol is one of the most popular cryptographic protocols on the Internet. Unfortunately, the current SSH authenticated encryption mechanism is insecure.  ...  Acknowledgments We thank Alexandra Boldyreva, Gregory Neven, Adriana Palacio, Bill Sommerfeld, and David Wagner for commenting on an earlier version of this paper. T.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/996943.996945">doi:10.1145/996943.996945</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zzsfk3tvgvf35lb2a4qdte7axi">fatcat:zzsfk3tvgvf35lb2a4qdte7axi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20051215171359/http://eprint.iacr.org:80/2002/078.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3d/86/3d863597d85ae10073c453143b546a6a673acce9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/996943.996945"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption

Shuai Han, Shengli Liu, Lin Lyu
<span title="">2017</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sdme5pnua5auzcsjgqmqefb66m" style="color: black;">Security and Communication Networks</a> </i> &nbsp;
We present a generic construction of AIAE from tag-based hash proof system (HPS) and one-time secure authenticated encryption (AE) and give an instantiation of AIAE under the Decisional Diffie-Hellman  ...  For AIAE, we introduce two related-key attack (RKA) security notions, including IND-RKA and weak-INT-RKA.  ...  Acknowledgments This work was supported by the National Natural Science Foundation of China Grant nos. 61672346 and 61373153. Security and Communication Networks  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2017/2148534">doi:10.1155/2017/2148534</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4ex7honpx5aqnpjtadk4yfr5ey">fatcat:4ex7honpx5aqnpjtadk4yfr5ey</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200211064242/http://downloads.hindawi.com/journals/scn/2017/2148534.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9b/50/9b5089d4dd19e1a9f3e43651928a0d33304611fd.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2017/2148534"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems [chapter]

Michael Clear, Karl Reid, Desmond Ennis, Arthur Hughes, Hitesh Tewari
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We improve upon existing solutions by securely preserving real-time collaboration for encrypted documents and facilitating self-containment of the metadata (an overhead of encryption) within the same document  ...  Nevertheless, key sharing has been incorporated into our proof-of-concept implementation by intercepting the requests that specifically relate to document sharing, and then enveloping the symmetric key  ...  The work of the second and third authors was supported by funding from Enterprise Ireland.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-33383-5_13">doi:10.1007/978-3-642-33383-5_13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/onwz773tuvck7pboakwgogteiu">fatcat:onwz773tuvck7pboakwgogteiu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170815171204/http://www.tara.tcd.ie/bitstream/handle/2262/68179/paper.pdf?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/66/76/667677fd3ba1efe88c43c03171c1a5cbcce0a944.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-33383-5_13"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy [chapter]

Tibor Jager, Martijn Stam, Ryan Stanley-Oakes, Bogdan Warinschi
<span title="">2017</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We prove this result for all three classical single-key security notions capturing confidentiality, authenticity and the combined authenticated encryption notion.  ...  We show that for all single-key secure encryption schemes satisfying a minimal key uniqueness assumption and almost any instantiation of our general multi-key security notion, any reasonable reduction  ...  This work was supported by an EPSRC Industrial CASE award and DFG grant JA 2445/1-1. The authors would also like to thank the anonymous TCC reviewers for their constructive comments on our paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-70500-2_14">doi:10.1007/978-3-319-70500-2_14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/afehqm23tzhqff3bfqemgifzoy">fatcat:afehqm23tzhqff3bfqemgifzoy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721073357/https://eprint.iacr.org/2017/495.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f2/92/f292719e2b1791ee2cf46f7288e9f5c16259cae5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-70500-2_14"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN

Carlos Andres Lara-Nino, Arturo Diaz-Perez, Miguel Morales-Sandoval
<span title="2018-09-04">2018</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sdme5pnua5auzcsjgqmqefb66m" style="color: black;">Security and Communication Networks</a> </i> &nbsp;
In this paper we explore hardware implementation alternatives of authenticated encryption through generic compositions, to assess the costs of this security approach in WSN.  ...  Authenticated encryption is a mechanism to provide these systems with confidentiality, integrity, and authentication of sensitive data.  ...  Acknowledgments This work was supported by CONACyT [Grants nos. 393070 and 336750] and CINVESTAV.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2018/5087065">doi:10.1155/2018/5087065</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hukeem4m5fhijfecdtdrg46rmu">fatcat:hukeem4m5fhijfecdtdrg46rmu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190502022413/http://downloads.hindawi.com/journals/scn/2018/5087065.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a5/4d/a54d3938cf830449c78a7774c478fba17c43314e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2018/5087065"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes [chapter]

Ewan Fleischmann, Christian Forler, Stefan Lucks
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line computable.  ...  Most block cipher-based schemes for Authenticated Encryption can be run on-line and are provably secure against nonce-respecting adversaries. But they fail badly for more general adversaries.  ...  Acknowledgments We like to thank Jakob Wenzel for very helpful comments, Phil Rogaway for making us aware of the Galois field native instructions, and the participants of the Dagstuhl Seminar on Symmetric  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-34047-5_12">doi:10.1007/978-3-642-34047-5_12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yeu2qvbyxfgydogncmxvzyg3zi">fatcat:yeu2qvbyxfgydogncmxvzyg3zi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808033440/https://www.iacr.org/workshops/fse2012/FSEpreproceedings/PDF/40.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ce/93/ce933513042628c707139d4703943c5c84f895a5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-34047-5_12"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Authenticated Encryption in the Face of Protocol and Side Channel Leakage [chapter]

Guy Barwell, Daniel P. Martin, Elisabeth Oswald, Martijn Stam
<span title="">2017</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
This work includes several novel contributions: we augment the notion of nonce-base authenticated encryption with the notion of continuous leakage and we prove composition results in the face of protocol  ...  Moreover, we show how to achieve authenticated encryption that is simultaneously both misuse resistant and leakage resilient, based on a sufficiently leakage resilient PRF, and finally we propose a concrete  ...  The robust authenticated encryption notion of Hoang et al. [24] also implies security against the leakage of these candidate plaintexts, among other goals.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-70694-8_24">doi:10.1007/978-3-319-70694-8_24</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fexpvna2gfdcrmtmysiec42pra">fatcat:fexpvna2gfdcrmtmysiec42pra</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170710131517/http://eprint.iacr.org/2017/068.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e0/10/e0100b98fbf48a1b71370831b3f0072d089d1182.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-70694-8_24"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors

Olivier Bronchain, Charles Momin, Thomas Peters, François-Xavier Standaert
<span title="2021-07-09">2021</span> <i title="Universitatsbibliothek der Ruhr-Universitat Bochum"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yz7ssmvstjhsxiwixprnmyijnq" style="color: black;">Transactions on Cryptographic Hardware and Embedded Systems</a> </i> &nbsp;
s leakage-resilient authenticated encryption scheme from CHES 2020.  ...  We then describe and analyze a new mode of operation for which we propose more conservative security parameters and show that it competes with the CHES 2020 one in terms of performances.  ...  Acknowledgments Thomas Peters and François-Xavier Standaert are respectively research associate and senior research associate of the Belgian Fund for Scientific Research (F.R.S.-FNRS).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tches.v2021.i3.641-676">doi:10.46586/tches.v2021.i3.641-676</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7bq2ute76jcghnnc4f7563qm3u">fatcat:7bq2ute76jcghnnc4f7563qm3u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210716072913/https://tches.iacr.org/index.php/TCHES/article/download/8988/8565" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5e/7c/5e7cadcdeda13f0914d5ef6277de507ddf3f5458.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tches.v2021.i3.641-676"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 2,768 results