Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Authenticated encryption

Known as: AEAD, AE, Encrypt-and-MAC 
Authenticated Encryption (AE) or Authenticated Encryption with Associated Data (AEAD) is a form of encryption which simultaneously provides… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
This paper introduces a dedicated authenticated encryption algorithm AEGIS; AEGIS allows for the protection of associated data… Expand
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2011
Highly Cited
2011
This paper proposes a novel construction, called duplex, closely related to the sponge construction, that accepts message blocks… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
We study software performance of authenticated-encryption modes CCM, GCM, and OCB. Across a variety of platforms, we find OCB to… Expand
  • figure 1
  • figure 6
Is this relevant?
Highly Cited
2008
Highly Cited
2008
An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity. We… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
This document defines algorithms for Authenticated Encryption with Associated Data (AEAD), and defines a uniform interface and a… Expand
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We give a provable-security treatment for the key-wrap problem, providing definitions, constructions, and proofs. We suggest that… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We describe a parallelizable block-cipher mode of operation that simultaneously provides privacy and authenticity. OCB encrypts… Expand
  • figure 1
  • figure 2
  • figure 6
  • figure 7
  • figure 9
Is this relevant?
Highly Cited
2002
Highly Cited
2002
When a message is transformed into a ciphertext in a way designed to protect both its privacy and authenticity, there may be… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
The Secure Shell (SSH) protocol is one of the most popular cryptographic protocols on the Internet. Unfortunately, the current… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We describe a parallelizable block-cipher mode of operation that simultaneously provides privacy and authenticity. OCB encrypts… Expand
  • figure 1
  • figure 3
Is this relevant?