Abstract: this paper [JJV], NIST did a lot of further,independent, design. They ended up with a k... more Abstract: this paper [JJV], NIST did a lot of further,independent, design. They ended up with a kind of object that isn't even a conventional MAC,and isn't supported by any published scientific work. We don't think this is a right way to go. Werecommend abandoning RMAC and choosing a more mature construction
Abstract: We propose a block-cipher mode of operation, called EAX, for authenticated-encryption w... more Abstract: We propose a block-cipher mode of operation, called EAX, for authenticated-encryption with associated-data (AEAD). Given a nonce N, a message M, and a header H, the mode protects the privacy of M and the authenticity of both M and H. Strings N, M, H $ ...
ABSTRACT accounting. OCB uses djM j=ne + 2 block-cipher calls for a nonempty message M . (The emp... more ABSTRACT accounting. OCB uses djM j=ne + 2 block-cipher calls for a nonempty message M . (The empty string takes three block-cipher invocations, the same as a one-block message). We compare with CBC encryption and CBC encryption plus a CBC MAC:
Abstract: this paper [JJV], NIST did a lot of further,independent, design. They ended up with a k... more Abstract: this paper [JJV], NIST did a lot of further,independent, design. They ended up with a kind of object that isn't even a conventional MAC,and isn't supported by any published scientific work. We don't think this is a right way to go. Werecommend abandoning RMAC and choosing a more mature construction
Abstract: We propose a block-cipher mode of operation, called EAX, for authenticated-encryption w... more Abstract: We propose a block-cipher mode of operation, called EAX, for authenticated-encryption with associated-data (AEAD). Given a nonce N, a message M, and a header H, the mode protects the privacy of M and the authenticity of both M and H. Strings N, M, H $ ...
ABSTRACT accounting. OCB uses djM j=ne + 2 block-cipher calls for a nonempty message M . (The emp... more ABSTRACT accounting. OCB uses djM j=ne + 2 block-cipher calls for a nonempty message M . (The empty string takes three block-cipher invocations, the same as a one-block message). We compare with CBC encryption and CBC encryption plus a CBC MAC:
Uploads
Papers by Phillip Rogaway