Groups
Groups
Sign in
Groups
Groups
ciphermodes-forum
Conversations
About
Send feedback
Help
ciphermodes-forum
Contact owners and managers
1–30 of 31
Mark all as read
Report group
0 selected
Edward
10/9/25
Connecting
Hello, I'm new to this forum and actually found this group in one of the SP from NIST. I'd
unread,
Connecting
Hello, I'm new to this forum and actually found this group in one of the SP from NIST. I'd
10/9/25
John Preuß Mattsson
9/30/25
Historical documents
Hi, Not really a cipher mode issue, but I don't think NISTs have an active email list for
unread,
Historical documents
Hi, Not really a cipher mode issue, but I don't think NISTs have an active email list for
9/30/25
Ahmet MALAL
,
Roberto Avanzi
4
8/8/25
Wider Variant of AES - FPGA Implementation and GPU Optimization
We do intend to release the portable c ref code and some optimised versions, but it is not clean
unread,
Wider Variant of AES - FPGA Implementation and GPU Optimization
We do intend to release the portable c ref code and some optimised versions, but it is not clean
8/8/25
John Preuß Mattsson
8/6/25
Comments on NIST accordion proposal
Hi, Here are the comments Ericsson submitted on NIST's accordion proposal https://emanjon.github.
unread,
Comments on NIST accordion proposal
Hi, Here are the comments Ericsson submitted on NIST's accordion proposal https://emanjon.github.
8/6/25
Roberto Avanzi
, …
Jacob Christian Munch-Andersen
12
6/30/25
Our comments on Rijndael-256-256 and similar ciphers - and a proposal for a way to go forward
Wells thank you for the debate. I still prefer to save resources and have more flexible primitives at
unread,
Our comments on Rijndael-256-256 and similar ciphers - and a proposal for a way to go forward
Wells thank you for the debate. I still prefer to save resources and have more flexible primitives at
6/30/25
Markku-Juhani O. Saarinen
6/26/25
"Brief Comments on Rijndael-256 and the Standard RISC-V Cryptography Extensions"
Hi All, The attached memo "Brief Comments on Rijndael-256 and the Standard RISC-V Cryptography
unread,
"Brief Comments on Rijndael-256 and the Standard RISC-V Cryptography Extensions"
Hi All, The attached memo "Brief Comments on Rijndael-256 and the Standard RISC-V Cryptography
6/26/25
Dworkin, Morris J. (Fed)
, …
Roberto Avanzi
3
6/25/25
NIST accordion proposal
Hi Morris we welcome this idea, since we believe this is the right approach forward. This said,
unread,
NIST accordion proposal
Hi Morris we welcome this idea, since we believe this is the right approach forward. This said,
6/25/25
Dworkin, Morris J. (Fed)
4/11/25
NIST publishes accordion requirements
FYI, today NIST announced the release of NIST Interagency Report (IR) 8552 Requirements for
unread,
NIST publishes accordion requirements
FYI, today NIST announced the release of NIST Interagency Report (IR) 8552 Requirements for
4/11/25
John Preuß Mattsson
4/4/25
NIST SP 800-38G Rev. 1 (2nd Public Draft)
Hi, Here are the comments Ericsson submitted on SP 800-38G Rev. 1 (2nd Public Draft) https://emanjon.
unread,
NIST SP 800-38G Rev. 1 (2nd Public Draft)
Hi, Here are the comments Ericsson submitted on SP 800-38G Rev. 1 (2nd Public Draft) https://emanjon.
4/4/25
Dworkin, Morris J. (Fed)
,
John Preuß Mattsson
3
3/15/25
Planned revision of NIST SP 800-38D
Hi, Here are the pre-draft comments Ericsson submitted on SP 800-38D https://emanjon.github.io/NIST-
unread,
Planned revision of NIST SP 800-38D
Hi, Here are the pre-draft comments Ericsson submitted on SP 800-38D https://emanjon.github.io/NIST-
3/15/25
Dworkin, Morris J. (Fed)
,
Ilset Orzco
2
3/8/25
NIST plans
El viernes, 9 de agosto de 2024 a la(s) 12:43:19 pm UTC-7, Dworkin, Morris J. (Fed) escribió: On
unread,
NIST plans
El viernes, 9 de agosto de 2024 a la(s) 12:43:19 pm UTC-7, Dworkin, Morris J. (Fed) escribió: On
3/8/25
Tushar Patel
2/7/25
Re: Digest for ciphermodes-forum@list.nist.gov - 1 update in 1 topic
Please consider the cases of 1. IPsec, ESP framing 2. MACSec 2. There are some more issues that
unread,
Re: Digest for ciphermodes-forum@list.nist.gov - 1 update in 1 topic
Please consider the cases of 1. IPsec, ESP framing 2. MACSec 2. There are some more issues that
2/7/25
Morris Dworkin
, …
Markku-Juhani O. Saarinen
4
1/17/25
NIST requests public comments on Rijndael-256
Thanks Morris and Hi All, RISC-V Crypto SIG discussed Rijndael-256 in our meeting on Thursday,
unread,
NIST requests public comments on Rijndael-256
Thanks Morris and Hi All, RISC-V Crypto SIG discussed Rijndael-256 in our meeting on Thursday,
1/17/25
John Preuß Mattsson
12/22/24
GCM with Strong Secure Tags (GCM-SST) for AES and Rijndael-256-256
Hi, We made quite a lot of updates to GCM-SST that was presented at the 2023 Accordion workshop: -
unread,
GCM with Strong Secure Tags (GCM-SST) for AES and Rijndael-256-256
Hi, We made quite a lot of updates to GCM-SST that was presented at the 2023 Accordion workshop: -
12/22/24
Sonmez Turan, Meltem (Fed)
12/16/24
NIST IR 8537 - Workshop Report
Dear all, NIST hosted the NIST Workshop on the Requirements for an Accordion Cipher Mode 2024 on June
unread,
NIST IR 8537 - Workshop Report
Dear all, NIST hosted the NIST Workshop on the Requirements for an Accordion Cipher Mode 2024 on June
12/16/24
John Preuß Mattsson
2
7/27/24
Collision Attacks on Galois/Counter Mode (GCM)
Hi, I uploaded a revised version which has a better structure and contains improved analysis of near
unread,
Collision Attacks on Galois/Counter Mode (GCM)
Hi, I uploaded a revised version which has a better structure and contains improved analysis of near
7/27/24
Panos K.
2
7/22/24
AES-GEM maximum messages
Sorry for responding to my own message. Please disregard the previous analysis. n^4/2^258 should have
unread,
AES-GEM maximum messages
Sorry for responding to my own message. Please disregard the previous analysis. n^4/2^258 should have
7/22/24
John Preuß Mattsson
6/16/24
Security of the tweakable single-key Even-Mansour construction
Hi, My colleague Alexander Maximov recently published some notes [1] that could be of interest for
unread,
Security of the tweakable single-key Even-Mansour construction
Hi, My colleague Alexander Maximov recently published some notes [1] that could be of interest for
6/16/24
Watson Ladd
, …
Paul Crowley
8
6/10/24
Fwd: I like big blocks (and will say why)
On Sun, 9 Jun 2024 at 23:59, John Preuß Mattsson <john.m...@gmail.com> wrote: GCM with
unread,
Fwd: I like big blocks (and will say why)
On Sun, 9 Jun 2024 at 23:59, John Preuß Mattsson <john.m...@gmail.com> wrote: GCM with
6/10/24
Kerman, Sara J. (Fed)
5/30/24
NIST Workshop – Hotel and Registration Deadlines for the Accordion Block Cipher Mode Workshop
NIST Workshop on the Requirements for an Accordion Cipher Mode June 20-21, 2024 NIST/NCCoE –
unread,
NIST Workshop – Hotel and Registration Deadlines for the Accordion Block Cipher Mode Workshop
NIST Workshop on the Requirements for an Accordion Cipher Mode June 20-21, 2024 NIST/NCCoE –
5/30/24
Dworkin, Morris J. (Fed)
, …
John Preuß Mattsson
3
5/17/24
NIST workshop discussion draft on accordion mode requirements
Hi, Thanks to the NIST Cipher Modes Team for preparing the discussion draft. The draft was very
unread,
NIST workshop discussion draft on accordion mode requirements
Hi, Thanks to the NIST Cipher Modes Team for preparing the discussion draft. The draft was very
5/17/24
John Preuß Mattsson
5/14/24
Accordion: Security properties
Hi, NIST writes in [1]: "The security definition proposed in Section 2 (ie, VIL-SPRP in the
unread,
Accordion: Security properties
Hi, NIST writes in [1]: "The security definition proposed in Section 2 (ie, VIL-SPRP in the
5/14/24
John Preuß Mattsson
5/13/24
Accordion: Nonce Hiding, Replay Protection, and APIs
Hi, Nonce hiding [1] is an interesting feature that has recently seen broad adoption in modern
unread,
Accordion: Nonce Hiding, Replay Protection, and APIs
Hi, Nonce hiding [1] is an interesting feature that has recently seen broad adoption in modern
5/13/24
John Preuß Mattsson
5/13/24
Accordion: MRAE, DAE, Key wrap, and RAE
Hi, I strongly agree with NIST that “if the AEAD takes a nonce as one of the inputs, then nonce-
unread,
Accordion: MRAE, DAE, Key wrap, and RAE
Hi, I strongly agree with NIST that “if the AEAD takes a nonce as one of the inputs, then nonce-
5/13/24
John Preuß Mattsson
5/11/24
Accordion: Padding, ciphertext indistinguishability, and deniable encryption
Hi, I think the accordion mode is very exciting and I think it will be a very important building
unread,
Accordion: Padding, ciphertext indistinguishability, and deniable encryption
Hi, I think the accordion mode is very exciting and I think it will be a very important building
5/11/24
Tushar Patel
4/25/24
Submission for Accordion Mode
Dear Reviewers, After reading the current Accordion Requirements and some previously indicated notes
unread,
Submission for Accordion Mode
Dear Reviewers, After reading the current Accordion Requirements and some previously indicated notes
4/25/24
Tushar Patel
4/14/24
Re: Digest for ciphermodes-forum@list.nist.gov - 1 update in 1 topic
I took a look at the "Proposal of Requirements for an Accordion Mode" and noticed some
unread,
Re: Digest for ciphermodes-forum@list.nist.gov - 1 update in 1 topic
I took a look at the "Proposal of Requirements for an Accordion Mode" and noticed some
4/14/24
Dworkin, Morris J. (Fed)
, …
Tushar Patel
6
4/5/24
Announcement of NIST public workshop in June 2024
Hi Arne, I read the Accodion mode requirement and a 10 minute presentation does not require a full
unread,
Announcement of NIST public workshop in June 2024
Hi Arne, I read the Accodion mode requirement and a 10 minute presentation does not require a full
4/5/24
Tushar Patel
2
4/2/24
Re: Digest for ciphermodes-forum@list.nist.gov - 1 update in 1 topic
HI Arne, While there can be tweaks, would there be a specific cipher-mode describing such a cipher-
unread,
Re: Digest for ciphermodes-forum@list.nist.gov - 1 update in 1 topic
HI Arne, While there can be tweaks, would there be a specific cipher-mode describing such a cipher-
4/2/24
John Preuß Mattsson
, …
sanketh
4
10/11/23
Reflections after the workshop
Hello, Perhaps obvious, but I would like to gently push back against the view that "256 bits
unread,
Reflections after the workshop
Hello, Perhaps obvious, but I would like to gently push back against the view that "256 bits
10/11/23