rfc9771v2.txt   rfc9771.txt 
Internet Research Task Force (IRTF) A. Bozhko, Ed. Internet Research Task Force (IRTF) A. Bozhko, Ed.
Request for Comments: 9771 CryptoPro Request for Comments: 9771 CryptoPro
Category: Informational April 2025 Category: Informational May 2025
ISSN: 2070-1721 ISSN: 2070-1721
Properties of Authenticated Encryption with Associated Data (AEAD) Properties of Authenticated Encryption with Associated Data (AEAD)
Algorithms Algorithms
Abstract Abstract
Authenticated Encryption with Associated Data (AEAD) algorithms Authenticated Encryption with Associated Data (AEAD) algorithms
provide both confidentiality and integrity of data. The widespread provide both confidentiality and integrity of data. The widespread
use of AEAD algorithms in various applications has led to an use of AEAD algorithms in various applications has led to an
skipping to change at line 1121 skipping to change at line 1121
[HTT18] Hoang, V.T., Tessaro, S., and A. Thiruvengadam, "The [HTT18] Hoang, V.T., Tessaro, S., and A. Thiruvengadam, "The
Multi-user Security of GCM, Revisited: Tight Bounds for Multi-user Security of GCM, Revisited: Tight Bounds for
Nonce Randomization", Proceedings of the 2018 ACM SIGSAC Nonce Randomization", Proceedings of the 2018 ACM SIGSAC
Conference on Computer and Communications Security (CCS Conference on Computer and Communications Security (CCS
'18), pp. 1429-1440, DOI 10.1145/3243734.3243816, 2018, '18), pp. 1429-1440, DOI 10.1145/3243734.3243816, 2018,
<https://doi.org/10.1145/3243734.3243816>. <https://doi.org/10.1145/3243734.3243816>.
[IIM25] Inoue, A., Iwata, T., and K. Minematsu, "Comprehensive [IIM25] Inoue, A., Iwata, T., and K. Minematsu, "Comprehensive
Robustness Analysis of GCM, CCM, and OCB3", Topics in Robustness Analysis of GCM, CCM, and OCB3", Topics in
Cryptology CT-RSA 2025, Lecture Notes in Computer Cryptology - CT-RSA 2025, Lecture Notes in Computer
Science, vol. 15598, DOI 10.1007/978-3-031-88661-4_4, Science, vol. 15598, DOI 10.1007/978-3-031-88661-4_4,
2025, <https://doi.org/10.1007/978-3-031-88661-4_4>. 2025, <https://doi.org/10.1007/978-3-031-88661-4_4>.
[JMV2002] Joux, A., Martinet, G., and F. Valette, "Blockwise- [JMV2002] Joux, A., Martinet, G., and F. Valette, "Blockwise-
Adaptive Attackers Revisiting the (In)Security of Some Adaptive Attackers Revisiting the (In)Security of Some
Provably Secure Encryption Modes: CBC, GEM, IACBC", Provably Secure Encryption Modes: CBC, GEM, IACBC",
Advances in Cryptology - CRYPTO 2002, Lecture Notes in Advances in Cryptology - CRYPTO 2002, Lecture Notes in
Computer Science, vol. 2442, DOI 10.1007/3-540-45708-9_2, Computer Science, vol. 2442, DOI 10.1007/3-540-45708-9_2,
2002, <https://doi.org/10.1007/3-540-45708-9_2>. 2002, <https://doi.org/10.1007/3-540-45708-9_2>.
 End of changes. 2 change blocks. 
2 lines changed or deleted 2 lines changed or added

This html diff was produced by rfcdiff 1.48.