The cr.yp.to microblog: 2012.04.26 00:39:37

2012.04.26 00:39:37 (195280935502094336) from Daniel J. Bernstein, replying to "zooko❤ⓩ🛡🦓🦓🦓 (@zooko)" (195217615197712384):

@zooko Some authenticated ciphers advertise the flexibility to use short low-security authenticators; maybe you want the 0-bit extreme.

Context

2012.04.25 10:42:32 (195070274239086593) from "zooko❤ⓩ🛡🦓🦓🦓 (@zooko)":

“On the limits of use cases for authenticated encryption”: https://plus.google.com/108313527900507320366/posts/cMng6kChAAW

2012.04.25 20:00:16 (195210633694806016) from Daniel J. Bernstein, replying to "zooko❤ⓩ🛡🦓🦓🦓 (@zooko)" (195070274239086593):

We're hoping for in-depth discussion of use cases at DIAC. The call for papers explicitly includes white papers. @zooko

2012.04.25 20:28:01 (195217615197712384) from "zooko❤ⓩ🛡🦓🦓🦓 (@zooko)":

@hashbreaker Thanks for the encouragement. I hadn't previously considered that my use case could be an AE use case at all. Could it?