Authenticated-encryption with associated-data

@inproceedings{Rogaway2002AuthenticatedencryptionWA,
  title={Authenticated-encryption with associated-data},
  author={Phillip Rogaway},
  booktitle={ACM Conference on Computer and Communications Security},
  year={2002}
}
When a message is transformed into a ciphertext in a way designed to protect both its privacy and authenticity, there may be additional information, such as a packet header, that travels alongside the ciphertext (at least conceptually) and must get authenticated with it. We formalize and investigate this authenticated-encryption with associated-data (AEAD) problem. Though the problem has long been addressed in cryptographic practice, it was never provided a definition or even a name. We do this… CONTINUE READING
Highly Influential
This paper has highly influenced 23 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 311 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 200 extracted citations

A Simple and Generic Construction of Authenticated Encryption with Associated Data

ACM Trans. Inf. Syst. Secur. • 2009
View 12 Excerpts
Highly Influenced

Implementation and Analysis of QUIC for MQTT

View 6 Excerpts
Highly Influenced

Secure Channels and Termination: The Last Word on TLS

IACR Cryptology ePrint Archive • 2017
View 17 Excerpts
Highly Influenced

Authenticated Encryption with Variable Stretch

IACR Cryptology ePrint Archive • 2016
View 12 Excerpts
Highly Influenced

Ciphertext Forgery on HANUMAN

IACR Cryptology ePrint Archive • 2016
View 6 Excerpts
Highly Influenced

312 Citations

02040'01'04'08'12'16
Citations per Year
Semantic Scholar estimates that this publication has 312 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-3 of 3 references

Similar Papers

Loading similar papers…