{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:03:15Z","timestamp":1774022595635,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Commission Horizon2020 Research Programme","award":["645622"],"award-info":[{"award-number":["645622"]}]},{"name":"BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813613","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"109-119","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":60,"title":["GCM-SIV"],"prefix":"10.1145","author":[{"given":"Shay","family":"Gueron","sequence":"first","affiliation":[{"name":"University of Haifa and Intel Corporation, Haifa, Israel"}]},{"given":"Yehuda","family":"Lindell","sequence":"additional","affiliation":[{"name":"Bar-Ilan University, Ramat Gan, Israel"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Classification of the CAESAR Candidates. Cryptology ePrint Archive","author":"Abed F.","year":"2014","unstructured":"F. Abed , C. Forler and S. Lucks . Classification of the CAESAR Candidates. Cryptology ePrint Archive , 2014 \/792. http:\/\/eprint.iacr.org\/2014\/792.pdf. F. Abed, C. Forler and S. Lucks. Classification of the CAESAR Candidates. Cryptology ePrint Archive, 2014\/792. http:\/\/eprint.iacr.org\/2014\/792.pdf."},{"key":"e_1_3_2_1_2_1","volume-title":"http:\/\/competitions. cr.yp.to\/caesar-submissions.html","author":"Bahack L.","year":"2014","unstructured":"L. Bahack . Julius. http:\/\/competitions. cr.yp.to\/caesar-submissions.html , 2014 . L. Bahack. Julius. http:\/\/competitions. cr.yp.to\/caesar-submissions.html, 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"AES-Based Authenticated Encryption Modes in Parallel High-Performance Software. IACR Cryptology ePrint Archive, report 2014:186","author":"Bogdanov A.","year":"2014","unstructured":"A. Bogdanov , M.M. Lauridsen and E. Tischhauser . AES-Based Authenticated Encryption Modes in Parallel High-Performance Software. IACR Cryptology ePrint Archive, report 2014:186 , 2014 . A. Bogdanov, M.M. Lauridsen and E. Tischhauser.AES-Based Authenticated Encryption Modes in Parallel High-Performance Software. IACR Cryptology ePrint Archive, report 2014:186, 2014."},{"key":"e_1_3_2_1_4_1","unstructured":"E. Andreeva A. Bogdanov A. Luykx B. Mennink E. Tischhauser and K. Yasuda. AES-COPA v.1. CAESAR competition submission.  E. Andreeva A. Bogdanov A. Luykx B. Mennink E. Tischhauser and K. Yasuda. AES-COPA v.1. CAESAR competition submission."},{"key":"e_1_3_2_1_5_1","first-page":"531","volume-title":"ASIACRYPT 2000","author":"Namprempre C.","year":"1976","unstructured":". Bellare, and C. Namprempre . Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm . In ASIACRYPT 2000 , Springer (LNCS 1976 ), pages 531 -- 545 , 2000. . Bellare, and C. Namprempre. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In ASIACRYPT 2000, Springer (LNCS 1976), pages 531--545, 2000."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34047-5_12"},{"key":"e_1_3_2_1_7_1","unstructured":"S. Gueron. Intel Advanced Encryption Standard (AES) Instructions Set Rev 3.01. Intel Software Network. (2012) https:\/\/software.intel.com\/en-us\/articles\/intel-advanced-encryption-standard-aes-instructions-set  S. Gueron. Intel Advanced Encryption Standard (AES) Instructions Set Rev 3.01. Intel Software Network. (2012) https:\/\/software.intel.com\/en-us\/articles\/intel-advanced-encryption-standard-aes-instructions-set"},{"key":"e_1_3_2_1_8_1","volume-title":"AES-GCM for Efficient Authenticated Encryption -- Ending the Reign of HMAC-SHA-1? In Real-World Cryptography","author":"Gueron S.","year":"2013","unstructured":"S. Gueron , AES-GCM for Efficient Authenticated Encryption -- Ending the Reign of HMAC-SHA-1? In Real-World Cryptography , 2013 . https:\/\/crypto.stanford.edu\/RealWorldCrypto\/ slides\/gueron.pdf S. Gueron, AES-GCM for Efficient Authenticated Encryption -- Ending the Reign of HMAC-SHA-1? In Real-World Cryptography, 2013. https:\/\/crypto.stanford.edu\/RealWorldCrypto\/ slides\/gueron.pdf"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03317-9_4"},{"key":"e_1_3_2_1_10_1","unstructured":"S. Gueron M. E. Kounavis. Intel Carry-Less Multiplication and Its Usage for Computing The GCM Mode Rev 2.01. Intel Software Network. http:\/\/software.intel.com\/sites\/default\/files\/ article\/165685\/clmul-wp-rev-2.01--2012-09--21.pdf  S. Gueron M. E. Kounavis. Intel Carry-Less Multiplication and Its Usage for Computing The GCM Mode Rev 2.01. Intel Software Network. http:\/\/software.intel.com\/sites\/default\/files\/ article\/165685\/clmul-wp-rev-2.01--2012-09--21.pdf"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2010.04.011"},{"key":"e_1_3_2_1_12_1","volume-title":"Robust Authenticated-Encryption: AEZ and the Problem That It Solves. In EUROCRYPT 2015","author":"Hoang T.","year":"2015","unstructured":". T. Hoang , T. Krovetz and P. Rogaway . Robust Authenticated-Encryption: AEZ and the Problem That It Solves. In EUROCRYPT 2015 , Springer (LNCS 9056), pages 15--44 , 2015 . .T. Hoang, T. Krovetz and P. Rogaway. Robust Authenticated-Encryption: AEZ and the Problem That It Solves. In EUROCRYPT 2015, Springer (LNCS 9056), pages 15--44, 2015."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704278"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03317-9_24"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05445-7_20"},{"key":"e_1_3_2_1_16_1","volume-title":"http:\/\/competitions. cr.yp.to\/caesar-submissions.html","author":"Krovetz T.","year":"2014","unstructured":"T. Krovetz . HS1- SIV. http:\/\/competitions. cr.yp.to\/caesar-submissions.html , 2014 . T. Krovetz. HS1-SIV. http:\/\/competitions. cr.yp.to\/caesar-submissions.html, 2014."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30556-9_27"},{"key":"e_1_3_2_1_18_1","volume-title":"Reconsidering Generic Composition. In EUROCRYPT","author":"Rogaway P.","year":"2014","unstructured":". Namprempre, P. Rogaway and T. Shrimpton . Reconsidering Generic Composition. In EUROCRYPT 2014 . . Namprempre, P. Rogaway and T. Shrimpton. Reconsidering Generic Composition. In EUROCRYPT 2014."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12475-9_5"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_23"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813613","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:36Z","timestamp":1750225716000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813613"}},"subtitle":["Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":20,"alternative-id":["10.1145\/2810103.2813613","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813613","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}