
Keccak
 Referenced in 86 articles
[sw09834]
 pseudorandom number generation to authenticated encryption. For a quick introduction, we propose a pseudo...

Quark
 Referenced in 22 articles
[sw08447]
 message authentication, stream encryption, or authenticated encryption. Our hardware evaluation shows that Quark compares well...

McOE
 Referenced in 16 articles
[sw20876]
 Family of Almost Foolproof OnLine Authenticated Encryption Schemes. OnLine Authenticated Encryption (OAE) combines ... Most block cipherbased schemes for Authenticated Encryption can be run online ... cryptographers developed misuseresistant schemes for Authenticated Encryption. These guarantee excellent security even against general...

tweakey
 Referenced in 28 articles
[sw12816]
 increase of security of wellknown authenticated encryptions mode like Θcb3 from birthdaybound security...

ELmD
 Referenced in 14 articles
[sw20823]
 ELmD: a pipelineable authenticated encryption and its hardware implementation. Authenticated encryption schemes which resist misuse ... privacy are twopass or MacthenEncrypt constructions (inherently inefficient but provide full privacy ... online constructions like McOE, spongetype authenticated encryptions (such as duplex) and COPA. Only ... design a new online secure authenticated encryption, called ELmD or EncryptLinear mixDecrypt, which...

Minalpher
 Referenced in 11 articles
[sw40314]
 Minalpher is an authenticated encryption algorithm submitted to CAESAR (Competition for Authenticated Encryption: Security, Applicability...

XooTools
 Referenced in 6 articles
[sw41874]
 derivation. The suite includes two session authenticated encryption (SAE) modes: XoofffSANE and XoofffSANSE ... wide block cipher XoofffWBC and authenticated encryption mode XoofffWBCAE, obtained by instantiating ... hashing, encryption, MAC computation and authenticated encryption. Essentially, it is a duplex object extended with...

Romulus
 Referenced in 10 articles
[sw41025]
 block cipher (TBC) and which supports authenticated encryption with associated data (AEAD). For its more...

ELmE
 Referenced in 5 articles
[sw22881]
 ELmE: A misuse resistant parallel authenticated encryption. The authenticated encryptions which resist misuse of initial ... privacy are twopass or MacthenEncrypt constructions (inherently inefficient but provide full privacy ... online constructions, e.g., McOE, spongetype authenticated encryptions (such as duplex) and COPA. Only ... design a new online secure authenticated encryption, called ELmE or EncryptLinear mixEncrypt, which...

AEGIS
 Referenced in 5 articles
[sw13246]
 AEGIS: a fast authenticated encryption algorithm. This paper introduces a dedicated authenticated encryption algorithm AEGIS...

Saturnin
 Referenced in 6 articles
[sw41873]
 different modes to provide hashing and authenticated encryption in such a way that ... domain separation. Using it, we built two authenticated ciphers and a hash function. • Saturnin...

COBRA
 Referenced in 4 articles
[sw22878]
 misuseresistant scheme for online authenticated encryption, following the framework set forth by Fleischmann ... mode of operation for noncebased authenticated encryption, performing one block cipher call plus ... under nonce repetition. However, COBRA only provides authenticity against noncerespecting adversaries. As compared...

Remus
 Referenced in 5 articles
[sw41026]
 Remus: authenticated encryption with associated data (AEAD) scheme based on a tweakable block cipher...

CBEAM
 Referenced in 3 articles
[sw15633]
 CBEAM: efficient authenticated encryption from feebly oneway φ functions. We show how efficient ... attacks. Our construction supports spongebased authenticated encryption, hashing, and PRF/PRNG modes and is highly...

ASC1
 Referenced in 2 articles
[sw19586]
 authenticated encryption stream cipher. The goal of the modes of operation for authenticated encryption ... achieve faster encryption and message authentication by performing both the encryption and the message authentication ... block limits the performance of the authenticated encryption schemes to at most one message block ... this paper, we propose the authenticated encryption scheme ASC1 (Authenticating Stream Cipher One). Similarly...

XKCP
 Referenced in 4 articles
[sw36433]
 Ketje and Keyak authenticated encryption schemes, the fast KangarooTwelve extendableoutput function, the Kravatte pseudo...

ForkAE
 Referenced in 2 articles
[sw41020]
 ForkAE is a lightweight authenticated encryption scheme optimized for processing of short messages ... round candidate in the NIST lightweight authenticated encryption standardization process. It is based...

POEx
 Referenced in 3 articles
[sw22877]
 building blocks for realizing efficient single pass encryption. In particular, the trend to limit ... reuses rendered them popular in recent authenticated encryption schemes. While encryption schemes, such...

ISAP
 Referenced in 3 articles
[sw43024]
 ISAP is a family of lightweight authenticated encryption algorithms designed with a focus on robustness...

Subterranean
 Referenced in 2 articles
[sw40714]
 encryption and several types of session authenticated encryption schemes. At its core...