Modes of Operation for Block Ciphers
Some relevant links:
Some relevant papers:
M. Bellare, A. Desai, E. Jokipii and P. Rogaway: A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. , Proceedings of 38th Annual Symposium on Foundations of Computer Science, IEEE, 1997.
Bellare and P. Rogaway: Code-Based Game-Playing Proofs and
the Security of Triple Encryption.
Advances in Cryptology - Eurocrypt 2006 Proceedings, Lecture Notes in Computer Science Vol. 4004, S. Vaudenay ed, Springer-Verlag, 2006.
John Black: Authenticated Encryption, Encyclopedia of Cryptography and Security, 2005
Bellare and C. Namprempre. : Authenticated Encryption: Relations
among notions and analysis of the generic composition paradigm.
Advances in Cryptology - Asiacrypt 2000
One-pass AE Schemes
Charanjit S. Jutla: Encryption Modes with Almost Free Message Integrity. Proc. Eurocrypt 2001, Cryptology ePrint Archive: Report 2000/039
Phillip Rogaway, Mihir Bellare, and John Black: OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption. ACM Transactions on Information and System Security (TISSEC), vol. 6, no. 3, pp. 365-403, August 2003. Earlier version, with Ted Krovetz, in Eighth ACM Conference on Computer and Communications Security (ACM CCS), ACM Press, pp. 196-205, 2001. Further information available from the OCB homepage.
Phillip Rogaway. Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. Asiacrypt 2004. LNCS vol. 3329. Springer, 2004.
Debrup Chakraborty and Palash Sarkar : A General Construction of Tweakable Block Ciphers and Different Modes of Operations, IEEE Transactions on Information Theory, April 2008
Two-pass AE Schemes
Russ Housley, Doug Whiting and Niels Ferguson: The CCM mode
Mihir Bellare, Phillip Rogaway, and David Wagner. The EAX Mode of Operation (A Two-Pass Authenticated Encryption Scheme Optimized for Simplicity and Efficiency). Fast Software Encryption (FSE), LNCS vol. 3017, pp. 389-407, 2004
David A. McGrew and John Viega : T he Security and Performance of the Galois/Counter Mode of Operation (Full Version)
Tadayoshi Kohno and John Viega and Doug Whiting : CWC: A high-performance conventional authenticated encryption mode
Stefan Lucks: Two-Pass Authenticated Encryption Faster than Generic Composition, Fast Software Encryption 2005.
Authenticated Encryption with Associated Data
Phillip Rogaway: Authenticated-Encryption with Associated-Data. ACM Conference on Computer and Communications Security 2002 (CCS'02), ACM Press, pp. 98-107, September 2002.
Tweakable Enciphering Schemes
Shai Halevi and Phillip Rogaway. A Tweakable Enciphering Mode. CRYPTO '03, LNCS vol. 2729, pp. 482-499, Springer, 2003
Shai Halevi and Phillip Rogaway. A Parallelizable Enciphering Mode. Topics in Cryptology, CT-RSA 2004, LNCS vol. 2964, pp. 292-304, Springer, 2004
Peng Wang, Dengguo Feng and Wenling Wu : HCTR: A variable input length enciphering mode, CISC 2005
Debrup Chakraborty and Palash Sarkar: A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random, Proceedings of Fast Software Encryption 2006
Debrup Chakraborty and Palash Sarkar: HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach, IEEE Transactions on Information Theory, April 2008
Palash Sarkar : Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions, initial version in Proceedings of ICISC 2007
Slides of two lectures that I gave in CINVESTAV in 2006:
Lecture 1: slides