Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
Real-world applications of authenticated encryption often require the encryption to be computable online, e.g. to compute the ith block of ciphertext after having processed the first i blocks of plaintext. A significant line of research was dedicated to identifying security notions for online authen...
| Published in: | IACR Transactions on Symmetric Cryptology |
|---|---|
| Main Authors: | , |
| Format: | Article |
| Language: | English |
| Published: |
Ruhr-Universität Bochum
2017-02-01
|
| Subjects: | |
| Online Access: | https://tosc.iacr.org/index.php/ToSC/article/view/568 |
