**Modes
of Operation for Block Ciphers**

**Some relevant links:**

NIST’s page on modes
of operations

**Some relevant papers:**

**Privacy Only**

**M.
Bellare, A. Desai, E. Jokipii and P. Rogaway:** A Concrete Security Treatment of Symmetric Encryption:
Analysis of the DES Modes of Operation. , Proceedings of 38th Annual Symposium on
Foundations of Computer Science, IEEE, 1997.

**M.
Bellare and P. Rogaway: **Code-Based Game-Playing Proofs and
the Security of Triple Encryption.

Advances in Cryptology - Eurocrypt 2006 Proceedings, Lecture Notes in Computer
Science Vol. 4004, S. Vaudenay ed, Springer-Verlag, 2006.

**Authenticated Encryption**

**John
Black: **Authenticated
Encryption, Encyclopedia of Cryptography and Security, 2005

**M.
Bellare and C. Namprempre. **: Authenticated Encryption: Relations
among notions and analysis of the generic composition paradigm.

Advances in Cryptology - Asiacrypt 2000

**One-pass AE Schemes**

**Charanjit S. Jutla**: Encryption Modes with Almost Free
Message Integrity. Proc. Eurocrypt 2001, Cryptology ePrint
Archive: Report 2000/039

**Phillip Rogaway, Mihir Bellare, and
John Black**: OCB: A Block-Cipher Mode of Operation for
Efficient Authenticated Encryption. *ACM Transactions on
Information and System Security (TISSEC)*, vol. 6, no. 3, pp. 365-403,
August 2003. Earlier version, with Ted Krovetz, in *Eighth ACM Conference on
Computer and Communications Security (ACM CCS)*, ACM Press, pp. 196-205,
2001. Further information available from the OCB homepage.

**Phillip Rogaway**. Efficient Instantiations of
Tweakable Blockciphers and Refinements to Modes OCB and PMAC. *Asiacrypt
2004.* LNCS vol. 3329. Springer, 2004.

**Debrup
Chakraborty and Palash Sarkar**** : **A General Construction of Tweakable
Block Ciphers and Different Modes of Operations, IEEE Transactions on
Information Theory, April 2008

**Two-pass AE Schemes**

**Russ Housley, Doug Whiting and Niels Ferguson**: The CCM
mode

**Mihir Bellare, Phillip Rogaway, and
David Wagner**. The EAX Mode of Operation (A Two-Pass
Authenticated Encryption Scheme Optimized for Simplicity and Efficiency). *Fast
Software Encryption (FSE)*, LNCS vol. 3017,
pp. 389-407, 2004

**David A.
McGrew and John Viega**** :** T he Security and Performance of the Galois/Counter Mode of Operation
(Full Version)

**Tadayoshi
Kohno and John Viega and Doug Whiting**** :** CWC: A high-performance
conventional authenticated encryption mode

**Stefan Lucks:** Two-Pass
Authenticated Encryption Faster than Generic Composition, Fast Software
Encryption 2005.

**Authenticated Encryption with
Associated Data**

**Phillip Rogaway**: Authenticated-Encryption with Associated-Data. *ACM Conference
on Computer and Communications Security 2002*
(CCS'02), ACM Press, pp. 98-107, September 2002.

**Tweakable Enciphering Schemes**

**Shai Halevi and Phillip Rogaway**. A Tweakable Enciphering Mode. *CRYPTO '03*, LNCS vol. 2729, pp. 482-499, Springer, 2003

**Shai Halevi and Phillip Rogaway**. A Parallelizable Enciphering Mode. *Topics in
Cryptology, CT-RSA 2004*, LNCS vol. 2964, pp.
292-304, Springer, 2004

**Peng Wang, Dengguo Feng and Wenling
Wu :** HCTR: A variable input length enciphering mode, CISC 2005

**Debrup Chakraborty
and Palash Sarkar****: **A New
Mode of Encryption Providing A Tweakable Strong Pseudo-Random, Proceedings of
Fast Software Encryption 2006

**Debrup Chakraborty
and Palash Sarkar****:** HCH: A New Tweakable Enciphering
Scheme Using the Hash-Counter-Hash Approach, IEEE Transactions on Information Theory, April
2008

**Palash Sarkar**** : **Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash
Functions**, **initial
version in** **Proceedings of ICISC 2007

**Slides of two lectures that I
gave in CINVESTAV in 2006:**

Lecture 1: slides

Lecture 2: slides(part1) slides(part2)