• Keccak

  • Referenced in 74 articles [sw09834]
  • pseudo-random number generation to authenticated encryption. For a quick introduction, we propose a pseudo...
  • Quark

  • Referenced in 20 articles [sw08447]
  • message authentication, stream encryption, or authenticated encryption. Our hardware evaluation shows that Quark compares well...
  • McOE

  • Referenced in 14 articles [sw20876]
  • Family of Almost Foolproof On-Line Authenticated Encryption Schemes. On-Line Authenticated Encryption (OAE) combines ... Most block cipher-based schemes for Authenticated Encryption can be run on-line ... cryptographers developed misuse-resistant schemes for Authenticated Encryption. These guarantee excellent security even against general...
  • tweakey

  • Referenced in 24 articles [sw12816]
  • increase of security of well-known authenticated encryptions mode like Θcb3 from birthday-bound security...
  • ELmD

  • Referenced in 13 articles [sw20823]
  • ELmD: a pipelineable authenticated encryption and its hardware implementation. Authenticated encryption schemes which resist misuse ... privacy are two-pass or Mac-then-Encrypt constructions (inherently inefficient but provide full privacy ... online constructions like McOE, sponge-type authenticated encryptions (such as duplex) and COPA. Only ... design a new online secure authenticated encryption, called ELmD or Encrypt-Linear mix-Decrypt, which...
  • Minalpher

  • Referenced in 10 articles [sw40314]
  • Minalpher is an authenticated encryption algorithm submitted to CAESAR (Competition for Authenticated Encryption: Security, Applicability...
  • ELmE

  • Referenced in 5 articles [sw22881]
  • ELmE: A misuse resistant parallel authenticated encryption. The authenticated encryptions which resist misuse of initial ... privacy are two-pass or Mac-then-Encrypt constructions (inherently inefficient but provide full privacy ... online constructions, e.g., McOE, sponge-type authenticated encryptions (such as duplex) and COPA. Only ... design a new online secure authenticated encryption, called ELmE or Encrypt-Linear mix-Encrypt, which...
  • AEGIS

  • Referenced in 5 articles [sw13246]
  • AEGIS: a fast authenticated encryption algorithm. This paper introduces a dedicated authenticated encryption algorithm AEGIS...
  • COBRA

  • Referenced in 4 articles [sw22878]
  • misuse-resistant scheme for online authenticated encryption, following the framework set forth by Fleischmann ... mode of operation for nonce-based authenticated encryption, performing one block cipher call plus ... under nonce repetition. However, COBRA only provides authenticity against nonce-respecting adversaries. As compared...
  • CBEAM

  • Referenced in 3 articles [sw15633]
  • CBEAM: efficient authenticated encryption from feebly one-way φ functions. We show how efficient ... attacks. Our construction supports sponge-based authenticated encryption, hashing, and PRF/PRNG modes and is highly...
  • ASC-1

  • Referenced in 2 articles [sw19586]
  • authenticated encryption stream cipher. The goal of the modes of operation for authenticated encryption ... achieve faster encryption and message authentication by performing both the encryption and the message authentication ... block limits the performance of the authenticated encryption schemes to at most one message block ... this paper, we propose the authenticated encryption scheme ASC-1 (Authenticating Stream Cipher One). Similarly...
  • POEx

  • Referenced in 3 articles [sw22877]
  • building blocks for realizing efficient single- pass encryption. In particular, the trend to limit ... reuses rendered them popular in recent authenticated encryption schemes. While encryption schemes, such...
  • Subterranean

  • Referenced in 2 articles [sw40714]
  • encryption and several types of session authenticated encryption schemes. At its core...
  • XKCP

  • Referenced in 2 articles [sw36433]
  • Ketje and Keyak authenticated encryption schemes, the fast KangarooTwelve extendable-output function, the Kravatte pseudo...
  • COFFE

  • Referenced in 1 article [sw15075]
  • Cryptanalysis of the authenticated encryption algorithm COFFE. COFFE is a hash-based authenticated encryption scheme...
  • miTLS

  • Referenced in 3 articles [sw27823]
  • main components, such as authenticated stream encryption for the record layer and key establishment...
  • FAN

  • Referenced in 1 article [sw40834]
  • paper, we propose a new lightweight authenticated encryption with additional data (AEAD) algorithm, named ... security and up to 72-bit authentication tag with the IV-respecting restriction. It consists...
  • Alred

  • Referenced in 1 article [sw20410]
  • message authentication code and the LetterSoup authenticated-encryption scheme,—bounding their security as a function...
  • Marvin

  • Referenced in 1 article [sw20412]
  • message authentication code and the LetterSoup authenticated-encryption scheme,—bounding their security as a function...
  • LetterSoup

  • Referenced in 1 article [sw20413]
  • message authentication code and the LetterSoup authenticated-encryption scheme,—bounding their security as a function...