This is an old revision of the document!
In the following we specify the meaning of each column of the table and give what we consider valid options for each column. If you feel that a valid option is missing for a particular column, we encourage you to e-mail
email@example.com with your suggestions for changes.
With no doubt, opinions vary as to what e.g. an online cipher is. With our valid options below, we try to capture all definitions or levels of which a certain property is obtained, allowing for a good comparison of the candidates.
For candidates containing several, say K, parameter sets, and where properties differ across these parameter sets, we suggest to comma-separate the properties for each set, such that the ith option in the comma-separated lists across all columns of the table correspond to the same parameter set of that particular candidate.
Specify the primitive(s) underlying the construction. Valid options are:
Specify separately whether the scheme is parallelizable in encryption (E) and decryption (D). Valid options for both cases are:
Specify separately whether the scheme is online in encryption (E) and decryption (D). Valid options for both cases are:
State the schemes resistance towards nonce misuse. Here, the nonce is defined as the tuple consisting of private message number and public message number. Valid options are:
State whether the scheme requires the inverse of the underlying primitive when considering . ONLY applicable for block cipher- or permutation-based modes. Valid options are: