3 Hits in 5.4 sec

COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse [chapter]

Elena Andreeva, Atul Luykx, Bart Mennink, Kan Yasuda
2015 Lecture Notes in Computer Science  
in a parallelizable way.  ...  As compared to COPA (ASIACRYPT 2013), our new scheme requires no block cipher inverse and hence enjoys provable security under a weaker assumption about the underlying block cipher.  ...  The latter design decision enables the use of just a single type of primitive, namely a block cipher in the forward encryption direction, without losing parallelizability, for efficiently authenticating  ... 
doi:10.1007/978-3-662-46706-0_10 fatcat:clxxfwnyrzaybcsptndzmwpryi

General classification of the authenticated encryption schemes for the CAESAR competition

Farzaneh Abed, Christian Forler, Stefan Lucks
2016 Computer Science Review  
Our goal is to provide easy-to-grasp tables to compare individual functional features (parallelizeability, onlineness, inverse-freeness, support for intermediate tags, and incrementality) for CAESAR candidates  ...  The "Galois Counter Mode" (GCM) [100] is a two-pass mode based on a block cipher.  ...  We call an AEAD scheme Π = (K, E, D) online if E is an online cipher and D its inverse operation. Schemes that are not online are called offline. Online Decryption.  ... 
doi:10.1016/j.cosrev.2016.07.002 fatcat:rm4lscpp7nghvioil4kljpfku4

The State of the Authenticated Encryption

Damian Vizár
2016 Tatra Mountains Mathematical Publications  
A lot of effort has been invested in authenticated encryption during the fifteen years of its existence.  ...  The notion of authenticated encryption marries these two security goals in a single symmetric-key, cryptographic primitive.  ...  Candidate Construction and features Security ACORN [73] Stream cipher-based, uses LFSRs. Fully parallelizable, online inverse free.  ... 
doi:10.1515/tmmp-2016-0038 fatcat:vnvjfj73yvff7ovjqagtwdpena