The design and evolution of OCB
From MaRDI portal
Publication:1983331
DOI10.1007/s00145-021-09399-8zbMath1472.94056OpenAlexW3186541779MaRDI QIDQ1983331
Publication date: 10 September 2021
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-021-09399-8
authenticated encryptionCAESAR competitionAEADOCBmodes of operationfast software encryptioncryptographic standards
Related Items (4)
Nonce-misuse security of the SAEF authenticated encryption mode ⋮ ALE: AES-Based Lightweight Authenticated Encryption ⋮ A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality ⋮ Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- Probabilistic encryption
- Reconciling two views of cryptography (The computational soundness of formal encryption)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- AEGIS: A Fast Authenticated Encryption Algorithm
- Authenticated Encryption with Variable Stretch
- The Software Performance of Authenticated-Encryption Modes
- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption
- Authenticated Encryption Mode for Beyond the Birthday Bound Security
- A Provable-Security Treatment of the Key-Wrap Problem
- New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
- BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption
- Reconsidering Generic Composition
- Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Fast Software Encryption
- Progress in Cryptology - INDOCRYPT 2004
- Cryptanalysis of OCB2: attacks on authenticity and confidentiality
This page was built for publication: The design and evolution of OCB