• Keccak

  • Referenced in 86 articles [sw09834]
  • pseudo-random number generation to authenticated encryption. For a quick introduction, we propose a pseudo...
  • Quark

  • Referenced in 22 articles [sw08447]
  • message authentication, stream encryption, or authenticated encryption. Our hardware evaluation shows that Quark compares well...
  • McOE

  • Referenced in 16 articles [sw20876]
  • Family of Almost Foolproof On-Line Authenticated Encryption Schemes. On-Line Authenticated Encryption (OAE) combines ... Most block cipher-based schemes for Authenticated Encryption can be run on-line ... cryptographers developed misuse-resistant schemes for Authenticated Encryption. These guarantee excellent security even against general...
  • tweakey

  • Referenced in 28 articles [sw12816]
  • increase of security of well-known authenticated encryptions mode like Θcb3 from birthday-bound security...
  • ELmD

  • Referenced in 14 articles [sw20823]
  • ELmD: a pipelineable authenticated encryption and its hardware implementation. Authenticated encryption schemes which resist misuse ... privacy are two-pass or Mac-then-Encrypt constructions (inherently inefficient but provide full privacy ... online constructions like McOE, sponge-type authenticated encryptions (such as duplex) and COPA. Only ... design a new online secure authenticated encryption, called ELmD or Encrypt-Linear mix-Decrypt, which...
  • Minalpher

  • Referenced in 11 articles [sw40314]
  • Minalpher is an authenticated encryption algorithm submitted to CAESAR (Competition for Authenticated Encryption: Security, Applicability...
  • XooTools

  • Referenced in 6 articles [sw41874]
  • derivation. The suite includes two session authenticated encryption (SAE) modes: Xoofff-SANE and Xoofff-SANSE ... wide block cipher Xoofff-WBC and authenticated encryption mode Xoofff-WBC-AE, obtained by instantiating ... hashing, encryption, MAC computation and authenticated encryption. Essentially, it is a duplex object extended with...
  • Romulus

  • Referenced in 10 articles [sw41025]
  • block cipher (TBC) and which supports authenticated encryption with associated data (AEAD). For its more...
  • ELmE

  • Referenced in 5 articles [sw22881]
  • ELmE: A misuse resistant parallel authenticated encryption. The authenticated encryptions which resist misuse of initial ... privacy are two-pass or Mac-then-Encrypt constructions (inherently inefficient but provide full privacy ... online constructions, e.g., McOE, sponge-type authenticated encryptions (such as duplex) and COPA. Only ... design a new online secure authenticated encryption, called ELmE or Encrypt-Linear mix-Encrypt, which...
  • AEGIS

  • Referenced in 5 articles [sw13246]
  • AEGIS: a fast authenticated encryption algorithm. This paper introduces a dedicated authenticated encryption algorithm AEGIS...
  • Saturnin

  • Referenced in 6 articles [sw41873]
  • different modes to provide hashing and authenticated encryption in such a way that ... domain separation. Using it, we built two authenticated ciphers and a hash function. • Saturnin...
  • COBRA

  • Referenced in 4 articles [sw22878]
  • misuse-resistant scheme for online authenticated encryption, following the framework set forth by Fleischmann ... mode of operation for nonce-based authenticated encryption, performing one block cipher call plus ... under nonce repetition. However, COBRA only provides authenticity against nonce-respecting adversaries. As compared...
  • Remus

  • Referenced in 5 articles [sw41026]
  • Remus: authenticated encryption with associated data (AEAD) scheme based on a tweakable block cipher...
  • CBEAM

  • Referenced in 3 articles [sw15633]
  • CBEAM: efficient authenticated encryption from feebly one-way φ functions. We show how efficient ... attacks. Our construction supports sponge-based authenticated encryption, hashing, and PRF/PRNG modes and is highly...
  • ASC-1

  • Referenced in 2 articles [sw19586]
  • authenticated encryption stream cipher. The goal of the modes of operation for authenticated encryption ... achieve faster encryption and message authentication by performing both the encryption and the message authentication ... block limits the performance of the authenticated encryption schemes to at most one message block ... this paper, we propose the authenticated encryption scheme ASC-1 (Authenticating Stream Cipher One). Similarly...
  • XKCP

  • Referenced in 4 articles [sw36433]
  • Ketje and Keyak authenticated encryption schemes, the fast KangarooTwelve extendable-output function, the Kravatte pseudo...
  • ForkAE

  • Referenced in 2 articles [sw41020]
  • ForkAE is a lightweight authenticated encryption scheme optimized for processing of short messages ... round candidate in the NIST lightweight authenticated encryption standardization process. It is based...
  • POEx

  • Referenced in 3 articles [sw22877]
  • building blocks for realizing efficient single- pass encryption. In particular, the trend to limit ... reuses rendered them popular in recent authenticated encryption schemes. While encryption schemes, such...
  • ISAP

  • Referenced in 3 articles [sw43024]
  • ISAP is a family of lightweight authenticated encryption algorithms designed with a focus on robustness...
  • Subterranean

  • Referenced in 2 articles [sw40714]
  • encryption and several types of session authenticated encryption schemes. At its core...