Hey, thanks Jeff !

I also inadvertently found an interresting article of a certain M. J. W. ...
;-)
I should have read more carefully :
http://www.codeproject.com/Articles/34380/Authenticated-Encryption
particularly when it states : "It is up to the receiver to determine whether to accept a tag which is truncated".

I take the opportunity to thank the numerous people on this list from whom I have learned a lot reading at their posts,
I cannot name them all, but Dave if one of them.

Le 19/06/2014 11:19, Jeffrey Walton a écrit :
If AEAD schemes are your thing, then you might take a look at David
Wagner's http://www.cs.berkeley.edu/~daw/talks/FSE04eax.ppt. Slide 7
has a nice comparison of CCM, CWC, EAX and GCM modes of operation.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to