{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:27:22Z","timestamp":1771518442970,"version":"3.50.1"},"reference-count":15,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2010,12,1]],"date-time":"2010-12-01T00:00:00Z","timestamp":1291161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2010,12]]},"abstract":"<jats:p>We revisit the problem of constructing a protocol for performing Authenticated Encryption with Associated Data (AEAD). A technique is described which combines a collision-resistant hash function with a protocol for Authenticated Encryption (AE). The technique is both simple and generic and does not require any additional key material beyond that of the AE protocol. Concrete instantiations are shown where a 256-bit hash function is combined with some known single-pass AE protocols employing either 128-bit or 256-bit block ciphers. This results in possible efficiency improvement in the processing of the header.<\/jats:p>","DOI":"10.1145\/1880022.1880027","type":"journal-article","created":{"date-parts":[[2010,12,29]],"date-time":"2010-12-29T14:32:48Z","timestamp":1293633168000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":107,"title":["A Simple and Generic Construction of Authenticated Encryption with Associated Data"],"prefix":"10.1145","volume":"13","author":[{"given":"Palash","family":"Sarkar","sequence":"first","affiliation":[{"name":"Indian Statistical Institute"}]}],"member":"320","published-online":{"date-parts":[[2010,12]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT\u201900)","volume":"1976","author":"Bellare M."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/647087.715843"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.920247"},{"key":"e_1_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Daemen J. and Rijmen V. 2002. The Design of Rijndael: AES - The Advanced Encryption Standard (Information Security and Cryptography). Springer. Daemen J. and Rijmen V. 2002. The Design of Rijndael: AES - The Advanced Encryption Standard (Information Security and Cryptography). Springer.","DOI":"10.1007\/978-3-662-04722-4"},{"key":"e_1_2_1_5_1","unstructured":"Federal Information Processing Standard. Publication 180-2. U.S. Department of Commerce National Institute of Standards and Technology(NIST). http:\/\/csrc.nist.gov\/publications\/fips\/fips180-2\/fips180-2withchangenotice.pdf. Federal Information Processing Standard. Publication 180-2. U.S. Department of Commerce National Institute of Standards and Technology(NIST). http:\/\/csrc.nist.gov\/publications\/fips\/fips180-2\/fips180-2withchangenotice.pdf."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/647936.741075"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/647086.759992"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335335"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/646767.704290"},{"key":"e_1_2_1_10_1","unstructured":"Rogaway P. OCB mode. http:\/\/www.cs.ucdavis.edu\/~rogaway\/ocb\/. Rogaway P. OCB mode. http:\/\/www.cs.ucdavis.edu\/~rogaway\/ocb\/."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586125"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30539-2_2"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11958239_14"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/937527.937529"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6344-y"}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1880022.1880027","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1880022.1880027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:15Z","timestamp":1750243935000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1880022.1880027"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":15,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,12]]}},"alternative-id":["10.1145\/1880022.1880027"],"URL":"https:\/\/doi.org\/10.1145\/1880022.1880027","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"value":"1094-9224","type":"print"},{"value":"1557-7406","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,12]]},"assertion":[{"value":"2008-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}