
Keccak
 Referenced in 74 articles
[sw09834]
 pseudorandom number generation to authenticated encryption. For a quick introduction, we propose a pseudo...

Quark
 Referenced in 20 articles
[sw08447]
 message authentication, stream encryption, or authenticated encryption. Our hardware evaluation shows that Quark compares well...

McOE
 Referenced in 14 articles
[sw20876]
 Family of Almost Foolproof OnLine Authenticated Encryption Schemes. OnLine Authenticated Encryption (OAE) combines ... Most block cipherbased schemes for Authenticated Encryption can be run online ... cryptographers developed misuseresistant schemes for Authenticated Encryption. These guarantee excellent security even against general...

tweakey
 Referenced in 24 articles
[sw12816]
 increase of security of wellknown authenticated encryptions mode like Θcb3 from birthdaybound security...

ELmD
 Referenced in 13 articles
[sw20823]
 ELmD: a pipelineable authenticated encryption and its hardware implementation. Authenticated encryption schemes which resist misuse ... privacy are twopass or MacthenEncrypt constructions (inherently inefficient but provide full privacy ... online constructions like McOE, spongetype authenticated encryptions (such as duplex) and COPA. Only ... design a new online secure authenticated encryption, called ELmD or EncryptLinear mixDecrypt, which...

Minalpher
 Referenced in 10 articles
[sw40314]
 Minalpher is an authenticated encryption algorithm submitted to CAESAR (Competition for Authenticated Encryption: Security, Applicability...

ELmE
 Referenced in 5 articles
[sw22881]
 ELmE: A misuse resistant parallel authenticated encryption. The authenticated encryptions which resist misuse of initial ... privacy are twopass or MacthenEncrypt constructions (inherently inefficient but provide full privacy ... online constructions, e.g., McOE, spongetype authenticated encryptions (such as duplex) and COPA. Only ... design a new online secure authenticated encryption, called ELmE or EncryptLinear mixEncrypt, which...

AEGIS
 Referenced in 5 articles
[sw13246]
 AEGIS: a fast authenticated encryption algorithm. This paper introduces a dedicated authenticated encryption algorithm AEGIS...

COBRA
 Referenced in 4 articles
[sw22878]
 misuseresistant scheme for online authenticated encryption, following the framework set forth by Fleischmann ... mode of operation for noncebased authenticated encryption, performing one block cipher call plus ... under nonce repetition. However, COBRA only provides authenticity against noncerespecting adversaries. As compared...

CBEAM
 Referenced in 3 articles
[sw15633]
 CBEAM: efficient authenticated encryption from feebly oneway φ functions. We show how efficient ... attacks. Our construction supports spongebased authenticated encryption, hashing, and PRF/PRNG modes and is highly...

ASC1
 Referenced in 2 articles
[sw19586]
 authenticated encryption stream cipher. The goal of the modes of operation for authenticated encryption ... achieve faster encryption and message authentication by performing both the encryption and the message authentication ... block limits the performance of the authenticated encryption schemes to at most one message block ... this paper, we propose the authenticated encryption scheme ASC1 (Authenticating Stream Cipher One). Similarly...

POEx
 Referenced in 3 articles
[sw22877]
 building blocks for realizing efficient single pass encryption. In particular, the trend to limit ... reuses rendered them popular in recent authenticated encryption schemes. While encryption schemes, such...

Subterranean
 Referenced in 2 articles
[sw40714]
 encryption and several types of session authenticated encryption schemes. At its core...

XKCP
 Referenced in 2 articles
[sw36433]
 Ketje and Keyak authenticated encryption schemes, the fast KangarooTwelve extendableoutput function, the Kravatte pseudo...

COFFE
 Referenced in 1 article
[sw15075]
 Cryptanalysis of the authenticated encryption algorithm COFFE. COFFE is a hashbased authenticated encryption scheme...

miTLS
 Referenced in 3 articles
[sw27823]
 main components, such as authenticated stream encryption for the record layer and key establishment...

FAN
 Referenced in 1 article
[sw40834]
 paper, we propose a new lightweight authenticated encryption with additional data (AEAD) algorithm, named ... security and up to 72bit authentication tag with the IVrespecting restriction. It consists...

Alred
 Referenced in 1 article
[sw20410]
 message authentication code and the LetterSoup authenticatedencryption scheme,—bounding their security as a function...

Marvin
 Referenced in 1 article
[sw20412]
 message authentication code and the LetterSoup authenticatedencryption scheme,—bounding their security as a function...

LetterSoup
 Referenced in 1 article
[sw20413]
 message authentication code and the LetterSoup authenticatedencryption scheme,—bounding their security as a function...