Skip Abstract Section
Abstract
This Recommendation specifies the Galois/Counter Mode (GCM), an algorithm for authenticated encryption with associated data, and its specialization, GMAC, for generating a message authentication code (MAC) on data that is not encrypted. GCM and GMAC are modes of operation for an underlying approved symmetric key block cipher.
Cited By
- Bhati A, Pohle E, Abidin A, Andreeva E and Preneel B Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, (2546-2560)
- Banerjee S, Wei S, Ramrakhyani P and Tiwari M Triton: Software-Defined Threat Model for Secure Multi-Tenant ML Inference Accelerators Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, (19-28)
- Ji Q, Rao Z, Chen M, Luo J and Zhou Z (2022). Security Analysis of Shadowsocks(R) Protocol, Security and Communication Networks, 2022, Online publication date: 1-Jan-2022.
- Pijnenburg J and Poettering B Efficiency Improvements for Encrypt-to-Self Proceedings of the 2nd Workshop on Cyber-Security Arms Race, (13-23)
- Marshall B, Page D and Pham T Implementing the Draft RISC-V Scalar Cryptography Extensions Proceedings of the 9th International Workshop on Hardware and Architectural Support for Security and Privacy, (1-8)
- Hunt T, Jia Z, Miller V, Szekely A, Hu Y, Rossbach C and Witchel E Telekine Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, (817-834)
- Huang Z, Lai J, Chen W, Au M, Peng Z and Li J (2019). Simulation-based selective opening security for receivers under chosen-ciphertext attacks, Designs, Codes and Cryptography, 87:6, (1345-1371), Online publication date: 1-Jun-2019.
- Eduardo V, De Bona L and Zola W Speculative encryption on GPU applied to cryptographic file systems Proceedings of the 17th USENIX Conference on File and Storage Technologies, (93-105)
- Martinasek Z, Hajny J, Smekal D, Malina L, Matousek D, Kekely M and Mentens N 200 Gbps Hardware Accelerated Encryption System for FPGA Network Cards Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, (11-17)
- Wong M, Haj-Yahya J and Chattopadhyay A SMARTS Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, (1-8)
- Capossele A, Petrioli C, Saturni G, Spaccini D and Venturi D Securing Underwater Communications Proceedings of the 12th International Conference on Underwater Networks & Systems, (1-5)
- Heuer F and Poettering B Selective Opening Security from Simulatable Data Encapsulation Proceedings, Part II, of the 22nd International Conference on Advances in Cryptology --- ASIACRYPT 2016 - Volume 10032, (248-277)
- Angel S and Setty S Unobservable communication over fully untrusted infrastructure Proceedings of the 12th USENIX conference on Operating Systems Design and Implementation, (551-569)
- Yalla P, Homsirikamol E and Kaps J Comparison of multi-purpose cores of Keccak and AES Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, (585-588)
- Weinberg Z, Wang J, Yegneswaran V, Briesemeister L, Cheung S, Wang F and Boneh D StegoTorus Proceedings of the 2012 ACM conference on Computer and communications security, (109-120)
- Rogers M and Saitta E Secure communication over diverse transports Proceedings of the 2012 ACM workshop on Privacy in the electronic society, (75-80)
- Engels D, Saarinen M, Schweitzer P and Smith E The hummingbird-2 lightweight authenticated encryption algorithm Proceedings of the 7th international conference on RFID Security and Privacy, (19-31)