In this work, we look at authenticated encryption schemes from a new perspective. As opposed to analyzing the security of different methods of constructing authenticated encryption schemes, we investigate the effect of the method used to construct an authenticated encryption scheme on the performance of the construction. We show that, by performing the authentication operation before the encryption operation, the security requirements on the authentication operation can be relaxed, leading to more efficient constructions, without affecting the security of the overall construction. © 2012 Springer-Verlag.
CITATION STYLE
Alomair, B. (2012). Authenticated encryption: How reordering can impact performance. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7341 LNCS, pp. 84–99). https://doi.org/10.1007/978-3-642-31284-7_6
Mendeley helps you to discover research relevant for your work.