rfc9771v2.txt | rfc9771.txt | |||
---|---|---|---|---|
Internet Research Task Force (IRTF) A. Bozhko, Ed. | Internet Research Task Force (IRTF) A. Bozhko, Ed. | |||
Request for Comments: 9771 CryptoPro | Request for Comments: 9771 CryptoPro | |||
Category: Informational April 2025 | Category: Informational May 2025 | |||
ISSN: 2070-1721 | ISSN: 2070-1721 | |||
Properties of Authenticated Encryption with Associated Data (AEAD) | Properties of Authenticated Encryption with Associated Data (AEAD) | |||
Algorithms | Algorithms | |||
Abstract | Abstract | |||
Authenticated Encryption with Associated Data (AEAD) algorithms | Authenticated Encryption with Associated Data (AEAD) algorithms | |||
provide both confidentiality and integrity of data. The widespread | provide both confidentiality and integrity of data. The widespread | |||
use of AEAD algorithms in various applications has led to an | use of AEAD algorithms in various applications has led to an | |||
skipping to change at line 1121 ¶ | skipping to change at line 1121 ¶ | |||
[HTT18] Hoang, V.T., Tessaro, S., and A. Thiruvengadam, "The | [HTT18] Hoang, V.T., Tessaro, S., and A. Thiruvengadam, "The | |||
Multi-user Security of GCM, Revisited: Tight Bounds for | Multi-user Security of GCM, Revisited: Tight Bounds for | |||
Nonce Randomization", Proceedings of the 2018 ACM SIGSAC | Nonce Randomization", Proceedings of the 2018 ACM SIGSAC | |||
Conference on Computer and Communications Security (CCS | Conference on Computer and Communications Security (CCS | |||
'18), pp. 1429-1440, DOI 10.1145/3243734.3243816, 2018, | '18), pp. 1429-1440, DOI 10.1145/3243734.3243816, 2018, | |||
<https://doi.org/10.1145/3243734.3243816>. | <https://doi.org/10.1145/3243734.3243816>. | |||
[IIM25] Inoue, A., Iwata, T., and K. Minematsu, "Comprehensive | [IIM25] Inoue, A., Iwata, T., and K. Minematsu, "Comprehensive | |||
Robustness Analysis of GCM, CCM, and OCB3", Topics in | Robustness Analysis of GCM, CCM, and OCB3", Topics in | |||
Cryptology – CT-RSA 2025, Lecture Notes in Computer | Cryptology - CT-RSA 2025, Lecture Notes in Computer | |||
Science, vol. 15598, DOI 10.1007/978-3-031-88661-4_4, | Science, vol. 15598, DOI 10.1007/978-3-031-88661-4_4, | |||
2025, <https://doi.org/10.1007/978-3-031-88661-4_4>. | 2025, <https://doi.org/10.1007/978-3-031-88661-4_4>. | |||
[JMV2002] Joux, A., Martinet, G., and F. Valette, "Blockwise- | [JMV2002] Joux, A., Martinet, G., and F. Valette, "Blockwise- | |||
Adaptive Attackers Revisiting the (In)Security of Some | Adaptive Attackers Revisiting the (In)Security of Some | |||
Provably Secure Encryption Modes: CBC, GEM, IACBC", | Provably Secure Encryption Modes: CBC, GEM, IACBC", | |||
Advances in Cryptology - CRYPTO 2002, Lecture Notes in | Advances in Cryptology - CRYPTO 2002, Lecture Notes in | |||
Computer Science, vol. 2442, DOI 10.1007/3-540-45708-9_2, | Computer Science, vol. 2442, DOI 10.1007/3-540-45708-9_2, | |||
2002, <https://doi.org/10.1007/3-540-45708-9_2>. | 2002, <https://doi.org/10.1007/3-540-45708-9_2>. | |||
End of changes. 2 change blocks. | ||||
2 lines changed or deleted | 2 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |