{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:49:22Z","timestamp":1767340162534,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T00:00:00Z","timestamp":1717027200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T00:00:00Z","timestamp":1717027200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2021R1F1A1047146"],"award-info":[{"award-number":["2021R1F1A1047146"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Korea Advanced Institute of Science and Technology"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2024,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Online authenticated encryption has been considered of practical relevance in light-weight environments due to low latency and constant memory usage. In this paper, we propose a new tweakable block cipher-based online authenticated encryption scheme, dubbed , and its domain separation variant, dubbed .  and  follow the Encrypt-Mix-Encrypt paradigm. However, in contrast to existing schemes using the same paradigm such as  and ,  and  enjoy <jats:italic>n<\/jats:italic>-bit security by using larger internal states with an efficient -like hashing algorithm. In this way, 2<jats:italic>n<\/jats:italic>-bit blocks are processed with only a single primitive call for hashing and two primitive calls for encryption and decryption, when they are based on an <jats:italic>n<\/jats:italic>-bit tweakable block cipher using <jats:italic>n<\/jats:italic>-bit\u00a0(resp. 2<jats:italic>n<\/jats:italic>-bit) tweaks for \u00a0(resp. ). Furthermore, they support pipelined computation as well as online nonce-misuse resistance. To the best of our knowledge,  and  are the first pipelineable tweakable block cipher-based online authenticated encryption schemes of rate-2\/3 that provide <jats:italic>n<\/jats:italic>-bit security with online nonce-misuse resistance.<\/jats:p>","DOI":"10.1007\/s10623-024-01434-6","type":"journal-article","created":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T11:04:02Z","timestamp":1717067042000},"page":"3261-3316","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["ZLR: a fast online authenticated encryption scheme achieving full security"],"prefix":"10.1007","volume":"92","author":[{"given":"Wonseok","family":"Choi","sequence":"first","affiliation":[]},{"given":"Seongha","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Byeonghak","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jooyoung","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,30]]},"reference":[{"key":"1434_CR1","doi-asserted-by":"crossref","unstructured":"Andreeva E., Bilgin B., Bogdanov A., Luykx A., Mennink B., Mouha N., Yasuda K.: APE: authenticated permutation-based encryption for lightweight cryptography. In: Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK, March 3\u20135: Revised Selected Papers 21, pp. 168\u2013186. Springer, Berlin (2015).","DOI":"10.1007\/978-3-662-46706-0_9"},{"key":"1434_CR2","unstructured":"Andreeva E., Bogdanov A., Luykx A., Mennink B., Tischhauser E., Yasuda K.: AES-COPA v (2015)."},{"key":"1434_CR3","doi-asserted-by":"crossref","unstructured":"Andreeva E., Lallemand V., Purnal A., Reyhanitabar R., Roy A., Viz\u00e1r D.: Forkcipher: a new primitive for authenticated encryption of very short messages. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 153\u2013182. Springer, Cham (2019).","DOI":"10.1007\/978-3-030-34621-8_6"},{"key":"1434_CR4","doi-asserted-by":"crossref","unstructured":"Andreeva E., Bhati A.S., Preneel B., Viz\u00e1r D.: 1, 2, 3, fork: counter mode variants based on a generalized forkcipher. In: Cryptology ePrint Archive (2021).","DOI":"10.46586\/tosc.v2021.i3.1-35"},{"key":"1434_CR5","doi-asserted-by":"crossref","unstructured":"Bao Z., Guo J., Iwata T., Minematsu K.: ZOCB and ZOTR: tweakable blockcipher modes for authenticated encryption with full absorption. In: IACR Transactions on Symmetric Cryptology, pp. 1\u201354 (2019).","DOI":"10.46586\/tosc.v2019.i2.1-54"},{"key":"1434_CR6","doi-asserted-by":"crossref","unstructured":"Bellare M., Rogaway P., Wagner D.: The EAX mode of operation. In: Fast Software Encryption: 11th International Workshop, FSE 2004, Delhi, India, February 5\u20137: Revised Papers 11, pp. 389\u2013407. Springer, Berlin (2004).","DOI":"10.1007\/978-3-540-25937-4_25"},{"key":"1434_CR7","doi-asserted-by":"crossref","unstructured":"Bertoni G., Daemen J., Peeters M., Van Assche G.: Duplexing the sponge: single-pass authenticated encryption and other applications. In: Selected Areas in Cryptography: 18th International Workshop, SAC: Toronto, ON, Canada, August 11\u201312, 2011, Revised Selected Papers 18, pp. 320\u2013337. Springer, Berlin (2012).","DOI":"10.1007\/978-3-642-28496-0_19"},{"key":"1434_CR8","doi-asserted-by":"crossref","unstructured":"Bhattacharya S., Nandi M.: Revisiting variable output length XOR pseudorandom function. In: IACR Transactions on Symmetric Cryptology, pp. 314\u2013335 (2018).","DOI":"10.46586\/tosc.v2018.i1.314-335"},{"key":"1434_CR9","unstructured":"Chakraborti A., Datta N., Jha A., Lopez C.M., Nandi M., Sasaki Y.: Lotus-aead and locus-aead. Submission to the NIST Lightweight Cryptography Project (2019)."},{"key":"1434_CR10","doi-asserted-by":"crossref","unstructured":"Chakraborti A., Datta N., Jha A., Mancillas-L\u00f3pez C., Nandi M.: Light-OCB: parallel lightweight authenticated cipher with full security. In: International Conference on Security, Privacy, and Applied Cryptography Engineering, pp. 22\u201341. Springer, Cham (2021).","DOI":"10.1007\/978-3-030-95085-9_2"},{"key":"1434_CR11","doi-asserted-by":"crossref","unstructured":"Daemen J., Mennink B., Van Assche G.: Full-state keyed duplex with built-in multi-user support. In: Advances in Cryptology-ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3\u20137, 2017, Proceedings, Part II 23, pp. 606\u2013637. Springer (2017).","DOI":"10.1007\/978-3-319-70697-9_21"},{"key":"1434_CR12","doi-asserted-by":"crossref","unstructured":"Datta N., Nandi M.: ELmE: A misuse resistant parallel authenticated encryption. In: Information Security and Privacy: 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7\u20139, 2014. Proceedings 19, pp. 306\u2013321. Springer (2014).","DOI":"10.1007\/978-3-319-08344-5_20"},{"key":"1434_CR13","doi-asserted-by":"crossref","unstructured":"Fleischmann E., Forler C., Lucks S.: McOE: A family of almost foolproof on-line authenticated encryption schemes. In: Fast Software Encryption: 19th International Workshop, FSE 2012, Washington, DC, USA, March 19\u201321: Revised Selected Papers, pp. 196\u2013215. Springer, Berlin (2012).","DOI":"10.1007\/978-3-642-34047-5_12"},{"key":"1434_CR14","doi-asserted-by":"crossref","unstructured":"Grochow T., List E., Nandi M.: Dovemac: a tbc-based PRF with smaller state, full security, and high rate. In: IACR Transactions on Symmetric Cryptology, pp. 43\u201380 (2019).","DOI":"10.46586\/tosc.v2019.i3.43-80"},{"key":"1434_CR15","doi-asserted-by":"crossref","unstructured":"Gueron S., Lindell Y.: GCM-SIV: full nonce misuse-resistant authenticated encryption at under one cycle per byte. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 109\u2013119 (2015).","DOI":"10.1145\/2810103.2813613"},{"key":"1434_CR16","doi-asserted-by":"crossref","unstructured":"Hoang V.T., Tessaro S.: Key-alternating ciphers and key-length extension: exact bounds and multi-user security. In: Advances in Cryptology-CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14\u201318, 2016, Proceedings, Part I 36, pp. 3\u201332. Springer, Berlin (2016).","DOI":"10.1007\/978-3-662-53018-4_1"},{"key":"1434_CR17","doi-asserted-by":"crossref","unstructured":"Hoang V.T., Krovetz T., Rogaway P.: Robust authenticated-encryption AEZ and the problem that it solves. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 15\u201344. Springer, Berlin (2015).","DOI":"10.1007\/978-3-662-46800-5_2"},{"key":"1434_CR18","doi-asserted-by":"crossref","unstructured":"Hoang V.T., Reyhanitabar R., Rogaway P., Viz\u00e1r D.: Online authenticated-encryption and its nonce-reuse misuse-resistance. In: Advances in Cryptology\u2013CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16\u201320, 2015, Proceedings, Part I 35, pp. 493\u2013517. Springer, Berlin (2015).","DOI":"10.1007\/978-3-662-47989-6_24"},{"key":"1434_CR19","doi-asserted-by":"crossref","unstructured":"Iwata T., Minematsu K., Peyrin T., Seurin Y.: ZMAC: a fast tweakable block cipher mode for highly secure message authentication. In: Annual International Cryptology Conference, pp. 34\u201365. Springer, Cham (2017).","DOI":"10.1007\/978-3-319-63697-9_2"},{"key":"1434_CR20","unstructured":"Jean J., Nikolic I., Peyrin T., Seurin Y.: Deoxys v1. 41. Submitted to CAESAR, p. 124 (2016)."},{"key":"1434_CR21","doi-asserted-by":"crossref","unstructured":"Krovetz T., Rogaway P.: The software performance of authenticated-encryption modes. In: Fast Software Encryption: 18th International Workshop, FSE: Lyngby, Denmark, February 13\u201316, 2011, Revised Selected Papers 18, pp. 306\u2013327. Springer, Berlin (2011).","DOI":"10.1007\/978-3-642-21702-9_18"},{"key":"1434_CR22","unstructured":"Leuven E.A.K., Leuven A.L.K., Leuven B.M.K.: COLM v1 (2016)."},{"key":"1434_CR23","doi-asserted-by":"crossref","unstructured":"Liskov M., Rivest R.L., Wagner D.: Tweakable block ciphers. In: Advances in Cryptology. CRYPTO 2002: 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18\u201322, 2002 Proceedings 22, pp. 31\u201346. Springer, Berlin (2002).","DOI":"10.1007\/3-540-45708-9_3"},{"key":"1434_CR24","doi-asserted-by":"crossref","unstructured":"McGrew D.A., Viega J.: The security and performance of the Galois\/counter mode (GCM) of operation. In: International Conference on Cryptology in India, pp. 343\u2013355. Springer, Berlin (2004).","DOI":"10.1007\/978-3-540-30556-9_27"},{"key":"1434_CR25","doi-asserted-by":"crossref","unstructured":"Minematsu K., Iwata T.: Tweak-length extension for tweakable blockciphers. In: IMA International Conference on Cryptography and Coding, pp. 77\u201393. Springer, Cham (2015).","DOI":"10.1007\/978-3-319-27239-9_5"},{"key":"1434_CR26","doi-asserted-by":"crossref","unstructured":"Patarin J.: The \u201ccoefficients H\u201d technique. In: International Workshop on Selected Areas in Cryptography, pp. 328\u2013345. Springer, Berlin (2008).","DOI":"10.1007\/978-3-642-04159-4_21"},{"key":"1434_CR27","doi-asserted-by":"crossref","unstructured":"Peyrin T., Seurin Y.: Counter-in-tweak: authenticated encryption modes for tweakable block ciphers. In: Annual International Cryptology Conference, pp. 33\u201363. Springer, Berlin (2016).","DOI":"10.1007\/978-3-662-53018-4_2"},{"key":"1434_CR28","doi-asserted-by":"crossref","unstructured":"Rogaway P., Shrimpton T.: A provable-security treatment of the key-wrap problem. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 373\u2013390. Springer, Berlin (2006).","DOI":"10.1007\/11761679_23"},{"key":"1434_CR29","doi-asserted-by":"crossref","unstructured":"Whiting D., Housley R., Ferguson N.: Counter with cbc-mac (ccm) (No. rfc3610) (2003).","DOI":"10.17487\/rfc3610"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-024-01434-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-024-01434-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-024-01434-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T20:18:58Z","timestamp":1726690738000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-024-01434-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,30]]},"references-count":29,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["1434"],"URL":"https:\/\/doi.org\/10.1007\/s10623-024-01434-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2024,5,30]]},"assertion":[{"value":"4 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}