| rfc9771v2.txt | rfc9771.txt | |||
|---|---|---|---|---|
| Internet Research Task Force (IRTF) A. Bozhko, Ed. | Internet Research Task Force (IRTF) A. Bozhko, Ed. | |||
| Request for Comments: 9771 CryptoPro | Request for Comments: 9771 CryptoPro | |||
| Category: Informational April 2025 | Category: Informational May 2025 | |||
| ISSN: 2070-1721 | ISSN: 2070-1721 | |||
| Properties of Authenticated Encryption with Associated Data (AEAD) | Properties of Authenticated Encryption with Associated Data (AEAD) | |||
| Algorithms | Algorithms | |||
| Abstract | Abstract | |||
| Authenticated Encryption with Associated Data (AEAD) algorithms | Authenticated Encryption with Associated Data (AEAD) algorithms | |||
| provide both confidentiality and integrity of data. The widespread | provide both confidentiality and integrity of data. The widespread | |||
| use of AEAD algorithms in various applications has led to an | use of AEAD algorithms in various applications has led to an | |||
| skipping to change at line 1121 ¶ | skipping to change at line 1121 ¶ | |||
| [HTT18] Hoang, V.T., Tessaro, S., and A. Thiruvengadam, "The | [HTT18] Hoang, V.T., Tessaro, S., and A. Thiruvengadam, "The | |||
| Multi-user Security of GCM, Revisited: Tight Bounds for | Multi-user Security of GCM, Revisited: Tight Bounds for | |||
| Nonce Randomization", Proceedings of the 2018 ACM SIGSAC | Nonce Randomization", Proceedings of the 2018 ACM SIGSAC | |||
| Conference on Computer and Communications Security (CCS | Conference on Computer and Communications Security (CCS | |||
| '18), pp. 1429-1440, DOI 10.1145/3243734.3243816, 2018, | '18), pp. 1429-1440, DOI 10.1145/3243734.3243816, 2018, | |||
| <https://doi.org/10.1145/3243734.3243816>. | <https://doi.org/10.1145/3243734.3243816>. | |||
| [IIM25] Inoue, A., Iwata, T., and K. Minematsu, "Comprehensive | [IIM25] Inoue, A., Iwata, T., and K. Minematsu, "Comprehensive | |||
| Robustness Analysis of GCM, CCM, and OCB3", Topics in | Robustness Analysis of GCM, CCM, and OCB3", Topics in | |||
| Cryptology – CT-RSA 2025, Lecture Notes in Computer | Cryptology - CT-RSA 2025, Lecture Notes in Computer | |||
| Science, vol. 15598, DOI 10.1007/978-3-031-88661-4_4, | Science, vol. 15598, DOI 10.1007/978-3-031-88661-4_4, | |||
| 2025, <https://doi.org/10.1007/978-3-031-88661-4_4>. | 2025, <https://doi.org/10.1007/978-3-031-88661-4_4>. | |||
| [JMV2002] Joux, A., Martinet, G., and F. Valette, "Blockwise- | [JMV2002] Joux, A., Martinet, G., and F. Valette, "Blockwise- | |||
| Adaptive Attackers Revisiting the (In)Security of Some | Adaptive Attackers Revisiting the (In)Security of Some | |||
| Provably Secure Encryption Modes: CBC, GEM, IACBC", | Provably Secure Encryption Modes: CBC, GEM, IACBC", | |||
| Advances in Cryptology - CRYPTO 2002, Lecture Notes in | Advances in Cryptology - CRYPTO 2002, Lecture Notes in | |||
| Computer Science, vol. 2442, DOI 10.1007/3-540-45708-9_2, | Computer Science, vol. 2442, DOI 10.1007/3-540-45708-9_2, | |||
| 2002, <https://doi.org/10.1007/3-540-45708-9_2>. | 2002, <https://doi.org/10.1007/3-540-45708-9_2>. | |||
| End of changes. 2 change blocks. | ||||
| 2 lines changed or deleted | 2 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||