2012.04.26 00:39:37 (195280935502094336) from Daniel J. Bernstein, replying to "zooko❤ⓩ🛡🦓🦓🦓 (@zooko)" (195217615197712384):
@zooko Some authenticated ciphers advertise the flexibility to use short low-security authenticators; maybe you want the 0-bit extreme.
2012.04.25 10:42:32 (195070274239086593) from "zooko❤ⓩ🛡🦓🦓🦓 (@zooko)":
“On the limits of use cases for authenticated encryption”: https://plus.google.com/108313527900507320366/posts/cMng6kChAAW
2012.04.25 20:00:16 (195210633694806016) from Daniel J. Bernstein, replying to "zooko❤ⓩ🛡🦓🦓🦓 (@zooko)" (195070274239086593):
We're hoping for in-depth discussion of use cases at DIAC. The call for papers explicitly includes white papers. @zooko
2012.04.25 20:28:01 (195217615197712384) from "zooko❤ⓩ🛡🦓🦓🦓 (@zooko)":
@hashbreaker Thanks for the encouragement. I hadn't previously considered that my use case could be an AE use case at all. Could it?