Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models

Real-world applications of authenticated encryption often require the encryption to be computable online, e.g. to compute the ith block of ciphertext after having processed the first i blocks of plaintext. A significant line of research was dedicated to identifying security notions for online authen...

Full description

Bibliographic Details
Main Authors: Guillaume Endignoux, Damian Vizár
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2017-02-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
Online Access:https://tosc.iacr.org/index.php/ToSC/article/view/568