2016
DOI: 10.1002/sec.1764
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated encryption: how reordering can impact performance

Abstract: Abstract. In this work, we look at authenticated encryption schemes from a new perspective. As opposed to focusing solely on the "security" implications of the different methods for constructing authenticated encryption schemes, we investigate the effect of the method used to construct an authenticated encryption scheme on the "performance" of the construction. We show that, as opposed to the current NIST standard, by performing the authentication operation before the encryption operation, the computational ef… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 73 publications
(131 reference statements)
0
1
0
Order By: Relevance
“…Depend on the workshops; NIST suggested more than one additional algorithm by generic competition. And NIST suggested a timetable for testing and published new using policy of the Hash functions [8,9].…”
Section: Hash Functionmentioning
confidence: 99%
“…Depend on the workshops; NIST suggested more than one additional algorithm by generic competition. And NIST suggested a timetable for testing and published new using policy of the Hash functions [8,9].…”
Section: Hash Functionmentioning
confidence: 99%