Topic
Authenticated encryption
About: Authenticated encryption is a research topic. Over the lifetime, 1328 publications have been published within this topic receiving 25968 citations. The topic is also known as: AEAD & Authenticated Encryption with Associated Data.
Papers published on a yearly basis
Papers
More filters
••
03 Dec 2017TL;DR: It is shown how to achieve authenticated encryption that is simultaneously both misuse resistant and leakage resilient, based on a sufficiently leakage resilient PRF, and finally a concrete, pairing-based instantiation of the latter is proposed.
Abstract: Authenticated encryption schemes in practice have to be robust against adversaries that have access to various types of leakage, for instance decryption leakage on invalid ciphertexts (protocol leakage), or leakage on the underlying primitives (side channel leakage). This work includes several novel contributions: we augment the notion of nonce-base authenticated encryption with the notion of continuous leakage and we prove composition results in the face of protocol and side channel leakage. Moreover, we show how to achieve authenticated encryption that is simultaneously both misuse resistant and leakage resilient, based on a sufficiently leakage resilient PRF, and finally we propose a concrete, pairing-based instantiation of the latter.
39 citations
••
TL;DR: By proposing a general solution for all the authenticated encryption schemes based on the discrete logarithm problem, the recipient can easily determine the missing message blocks, and then acknowledge the sender to send only these blocks again.
39 citations
••
TL;DR: A new authenticated encryption scheme with public verifiability that requires less computational costs and communication overhead than the conventional signature-then-encryption approaches and is not divulged during the public verification.
Abstract: A new authenticated encryption scheme with public verifiability is presented. The new scheme requires less computational costs and communication overhead than the conventional signature-then-encryption approaches. Furthermore the message is not divulged during the public verification.
38 citations
••
TL;DR: This work improves the basic scheme and proposes a generalized scheme, which allows the receiver to recover the partial message blocks before receiving the entire signature blocks and requires smaller bandwidth and computational time as compared to the previously proposed authenticated encryption schemes with message linkages for message flows.
38 citations
01 Nov 2007
TL;DR: This document specifies the conventions for using the AES-CCM andThe AES-GCM authenticated encryption algorithms with the Cryptographic Message Syntax (CMS) authenticated-enveloped-data content type.
Abstract: This document specifies the conventions for using the AES-CCM and the
AES-GCM authenticated encryption algorithms with the Cryptographic
Message Syntax (CMS) authenticated-enveloped-data content type.
[STANDARDS-TRACK]
37 citations