Authenticated encryption

Known as: AEAD, Encrypt-and-MAC, Authenticated Encryption with Associated Data 
Authenticated Encryption (AE) or Authenticated Encryption with Associated Data (AEAD) is a form of encryption which simultaneously provides… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1996-2017
05010019962017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
While mainstream symmetric cryptography has been dominated by block ciphers, we have proposed an alternative based on fixed-width… (More)
Is this relevant?
Highly Cited
2011
Highly Cited
2011
We study the software performance of authenticated-encryption modes CCM, GCM, and OCB. Across a variety of platforms, we find OCB… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
This paper proposes a novel construction, calledduplex, closely related to the sponge construction, that acceptsmessage blocks to… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally… (More)
  • table 1
  • table 2
  • table 3
  • figure 1
  • table 4
Is this relevant?
2011
2011
FPGA bitstream encryption blocks theft of the design in the FPGA bitstream by preventing unauthorized copy and reverse… (More)
  • figure 1
  • table 1
  • figure 3
Is this relevant?
2003
2003
We propose a block-cipher mode of operation, EAX, for authenticated-encryption with associateddata (AEAD). Given a nonce N , a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2003
2003
We introduce a new cryptographic primitive we call concealment, which is related, but quite different from the notion of… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
When a message is transformed into a ciphertext in a way designed to protect both its privacy and authenticity, there may be… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We describe a parallelizable block-cipher mode of operation that simultaneously provides privacy and authenticity. OCB encrypts… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity. We… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?