scispace - formally typeset
Search or ask a question
Topic

Authenticated encryption

About: Authenticated encryption is a research topic. Over the lifetime, 1328 publications have been published within this topic receiving 25968 citations. The topic is also known as: AEAD & Authenticated Encryption with Associated Data.


Papers
More filters
16 Jun 2006
TL;DR: This document describes the use of the Advanced Encryption Standard (AES) Counter Mode for use as a Transport Layer Security (TLS) and Datagram Transport Layer security (DTLS) confidentiality mechanism.
Abstract: This document describes the use of the Advanced Encryption Standard (AES) Counter Mode for use as a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) confidentiality mechanism.

8 citations

Posted Content
TL;DR: In this paper, a stream cipher based algorithm for computing message authentication codes is described, which employs the internal state of the underlying cipher to minimize the required additional-to-encryption computational effort and maintain general simplicity of the design.
Abstract: A stream cipher based algorithm for computing Message Authentication Codes is described. The algorithm employs the internal state of the underlying cipher to minimize the required additional-toencryption computational effort and maintain general simplicity of the design. The scheme appears to provide proper statistical properties, a comfortable level of resistance against forgery attacks in a chosen ciphertext attack model and high efficiency in software implementations.

8 citations

Journal ArticleDOI
TL;DR: A new authenticated encryption scheme with message linkages is presented to overcome the weakness in Tseng et al.'s scheme and it is efficient in the terms of communication and computation costs.

8 citations

Journal ArticleDOI
TL;DR: An original scheme called designated server certificateless deniably authenticated encryption with keyword search (dCLDAEKS), where leverages the techniques of DAE and designated server to better protect the sender’s identity privacy is introduced.
Abstract: In email system, the cryptography technology has been used to defend email secrets, so it is important to search specific encrypted emails on cloud sever without local decryption. The Public key encryption with keyword search (PEKS) might is a suitable way to perform the email ciphertext search. However, most existing PEKS schemes cannot protect the identity privacy of data sender. Deniably authenticated encryption (DAE) technique allows the data sender to deny his/her involvement after the communication. Moreover, the receiver can verify the authenticity of ciphertext in DAE, which assures the identity privacy of data sender. In this paper, so as to solve the above shortages in existing PEKS schemes, we introduce an original scheme called designated server certificateless deniably authenticated encryption with keyword search (dCLDAEKS), where leverages the techniques of DAE and designated server. In dCLDAEKS, data sender authenticates the messages and simultaneously encrypt them. Meanwhile, only designated server has ability to execute search ciphertext operation for receivers. So there is no adversary including the server can launch inside or outside offline KGA. Therefore dCLDAEKS scheme can better protect the identity privacy of data sender. In addition, compared the related schemes in the literature, dCLDAEKS scheme perform less efficient in some procedure, but it can against inside KGA and better protect the sender’s identity privacy.

8 citations

Proceedings ArticleDOI
03 May 2016
TL;DR: This work investigates three authenticated encryption modes CLOC, SILC and AES-OTR and investigates if they can be implemented in a compact fashion using the 8-bit serialized AES circuit.
Abstract: The most compact implementation of the AES-128 algorithm was the 8-bit serial circuit proposed in the work of Moradi et. al. (Eurocrypt 2011). The circuit has an 8-bit datapath and occupies area equivalent to around 2400 GE. Since many authenticated encryption modes use the AES-128 algorithm as the underlying block cipher, we investigate if they can be implemented in a compact fashion using the 8-bit serialized AES circuit. In this context we investigate three authenticated encryption modes CLOC, SILC and AES-OTR. Using the standard cell library of the STM 90nm process, we implemented CLOC and SILC with around 3110 GE whereas AES-OTR was implemented with around 4720 GE.

8 citations


Network Information
Related Topics (5)
Public-key cryptography
27.2K papers, 547.7K citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Encryption
98.3K papers, 1.4M citations
86% related
Hash function
31.5K papers, 538.5K citations
84% related
Authentication
74.7K papers, 867.1K citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202319
202252
202167
2020109
2019111
201897