Welcome to the resource topic for 2003/177
Title:
Building Secure Cryptographic Transforms, or How to Encrypt and MAC
Authors: Tadayoshi Kohno, Adriana Palacio, John Black
Abstract:We describe several notions of ``cryptographic transforms,‘’
symmetric schemes designed to meet a variety of privacy and
authenticity goals. We consider goals, such as replay-avoidance and
in-order packet delivery, that have not been fully addressed in
previous works in this area. We then provide an analysis of
possible ways to combine standard encryption and message
authentication schemes in order to provably meet these
goals. Our results further narrow the gap between
the provable-security results from the theoretical community and the
needs of developers who implement real systems.
ePrint: https://eprint.iacr.org/2003/177
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .