{"id":"https://openalex.org/W2905240826","doi":"https://doi.org/10.3390/cryptography2040042","title":"CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion","display_name":"CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion","publication_year":2018,"publication_date":"2018-12-19","ids":{"openalex":"https://openalex.org/W2905240826","doi":"https://doi.org/10.3390/cryptography2040042","mag":"2905240826"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography2040042","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2040042","pdf_url":"https://www.mdpi.com/2410-387X/2/4/42/pdf?version=1545285451","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/2/4/42/pdf?version=1545285451","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034642408","display_name":"Jonathan Trostle","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jonathan Trostle","raw_affiliation_strings":["Independent Researcher, Vancouver, WA 98684, USA"],"affiliations":[{"raw_affiliation_string":"Independent Researcher, Vancouver, WA 98684, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5034642408"],"corresponding_institution_ids":[],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.15289432,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2","issue":"4","first_page":"42","last_page":"42"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated encryption","score":0.8882220387458801},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7234571576118469},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.697040855884552},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5299590229988098},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5008909702301025},{"id":"https://openalex.org/keywords/initialization","display_name":"Initialization","score":0.4456362724304199},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.44271886348724365},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3794381320476532}],"concepts":[{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.8882220387458801},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7234571576118469},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.697040855884552},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5299590229988098},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5008909702301025},{"id":"https://openalex.org/C114466953","wikidata":"https://www.wikidata.org/wiki/Q6034165","display_name":"Initialization","level":2,"score":0.4456362724304199},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.44271886348724365},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3794381320476532},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/cryptography2040042","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2040042","pdf_url":"https://www.mdpi.com/2410-387X/2/4/42/pdf?version=1545285451","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.640.880","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.640.880","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://eprint.iacr.org/2013/269.pdf","raw_type":"text"},{"id":"pmh:oai:doaj.org/article:789bfa97214a4fb4abc2e82c2d0bf83b","is_oa":true,"landing_page_url":"https://doaj.org/article/789bfa97214a4fb4abc2e82c2d0bf83b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 2, Iss 4, p 42 (2018)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2410-387X/2/4/42/","is_oa":true,"landing_page_url":"http://doi.org/10.3390/cryptography2040042","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/cryptography2040042","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2040042","pdf_url":"https://www.mdpi.com/2410-387X/2/4/42/pdf?version=1545285451","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.8100000023841858,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2905240826.pdf","grobid_xml":"https://content.openalex.org/works/W2905240826.grobid-xml"},"referenced_works_count":61,"referenced_works":["https://openalex.org/W53577213","https://openalex.org/W72141113","https://openalex.org/W76791259","https://openalex.org/W196598226","https://openalex.org/W1486307742","https://openalex.org/W1504211573","https://openalex.org/W1525995698","https://openalex.org/W1528724153","https://openalex.org/W1536045256","https://openalex.org/W1581346606","https://openalex.org/W1586481148","https://openalex.org/W1655844021","https://openalex.org/W1656028867","https://openalex.org/W1763079358","https://openalex.org/W1802259427","https://openalex.org/W1805451635","https://openalex.org/W1855109561","https://openalex.org/W1923289336","https://openalex.org/W1925495923","https://openalex.org/W1956043843","https://openalex.org/W1972464518","https://openalex.org/W1993257560","https://openalex.org/W2003775087","https://openalex.org/W2073210531","https://openalex.org/W2090903439","https://openalex.org/W2093324650","https://openalex.org/W2104578476","https://openalex.org/W2107358757","https://openalex.org/W2112460803","https://openalex.org/W2113999696","https://openalex.org/W2117362057","https://openalex.org/W2122144036","https://openalex.org/W2126890474","https://openalex.org/W2133065964","https://openalex.org/W2138992486","https://openalex.org/W2139747141","https://openalex.org/W2146350800","https://openalex.org/W2149220756","https://openalex.org/W2163923040","https://openalex.org/W2165214731","https://openalex.org/W2183030485","https://openalex.org/W2201276240","https://openalex.org/W2257865464","https://openalex.org/W2290117735","https://openalex.org/W2294310511","https://openalex.org/W2406107187","https://openalex.org/W2408282941","https://openalex.org/W2478399942","https://openalex.org/W2488274487","https://openalex.org/W2491218084","https://openalex.org/W2496164548","https://openalex.org/W2501419099","https://openalex.org/W2611965338","https://openalex.org/W2612956763","https://openalex.org/W2625365318","https://openalex.org/W2951059239","https://openalex.org/W3014846293","https://openalex.org/W4206391718","https://openalex.org/W4243413272","https://openalex.org/W6631984881","https://openalex.org/W6635106494"],"related_works":["https://openalex.org/W3204184292","https://openalex.org/W3176564347","https://openalex.org/W1985458517","https://openalex.org/W2355833770","https://openalex.org/W3031039437","https://openalex.org/W3095877357","https://openalex.org/W4315926519","https://openalex.org/W3085294341","https://openalex.org/W1979725714","https://openalex.org/W3028626854"],"abstract_inverted_index":{"In":[0],"some":[1],"wireless":[2],"environments,":[3],"minimizing":[4,43],"the":[5,13,55,82,85,104,107,171],"size":[6],"of":[7,76,97,106,159,170],"messages":[8,49],"is":[9,31,42,118],"paramount":[10],"due":[11],"to":[12,73,81,102,120],"resulting":[14,86],"significant":[15],"energy":[16],"savings.":[17],"We":[18,134,154],"present":[19,156],"CMCC":[20],"(CBC-MAC-CTR-CBC),":[21],"an":[22,146],"authenticated":[23,140,147],"encryption":[24,141,148],"scheme":[25,117],"with":[26],"associated":[27],"data":[28],"(AEAD)":[29],"that":[30,112],"also":[32,155],"nonce":[33],"misuse":[34,138],"resistant.":[35],"The":[36],"main":[37],"focus":[38],"for":[39,47,126,152],"this":[40],"work":[41],"ciphertext":[44,83],"expansion,":[45],"especially":[46],"short":[48,114],"including":[50],"plaintext":[51],"lengths":[52],"less":[53],"than":[54],"underlying":[56],"block":[57],"cipher":[58],"length":[59,105],"(e.g.,":[60],"16":[61],"bytes).":[62],"For":[63,78,110],"many":[64],"existing":[65],"AEAD":[66],"schemes,":[67],"a":[68,74,95,137,157,167],"successful":[69],"forgery":[70],"leads":[71],"directly":[72],"loss":[75,96],"confidentiality.":[77],"CMCC,":[79,160],"changes":[80],"randomize":[84],"plaintext,":[87],"thus":[88],"forgeries":[89],"do":[90],"not":[91],"necessarily":[92],"result":[93],"in":[94],"confidentiality":[98],"which":[99,165],"allows":[100],"us":[101],"reduce":[103],"authentication":[108],"tag.":[109],"protocols":[111],"send":[113],"messages,":[115],"our":[116],"similar":[119],"Synthetic":[121],"Initialization":[122],"Vector":[123],"(SIV)":[124],"mode":[125],"computational":[127],"overhead":[128],"but":[129],"has":[130],"much":[131],"smaller":[132],"expansion.":[133],"prove":[135],"both":[136],"resistant":[139],"(MRAE)":[142],"security":[143,150,172],"bound":[144,151],"and":[145],"(AE)":[149],"CMCC.":[153],"variation":[158],"CWM":[161],"(CMCC":[162],"With":[163],"MAC),":[164],"provides":[166],"further":[168],"strengthening":[169],"bounds.":[173]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
