A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is
In this work, we look at authenticated encryption schemes from a new perspective. As opposed to focusing solely on the "security" implications of the different methods for constructing authenticated encryption schemes, we investigate the effect of the method used to construct an authenticated encryption scheme on the "performance" of the construction. We show that, as opposed to the current NIST standard, by performing the authentication operation before the encryption operation, thedoi:10.1002/sec.1764 fatcat:bqjrz75zizc7zmtph2carbomy4