Beyond conventional security in sponge-based authenticated encryption modes (Q2318091): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s00145-018-9299-7 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2808217567 / rank
 
Normal rank
Property / cites work
 
Property / cites work: APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Parallelizable and Authenticated Online Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of Keyed Sponge Constructions Using a Modular Proof Approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: NORX: Parallel and Scalable AEAD / rank
 
Normal rank
Property / cites work
 
Property / cites work: Authenticated encryption: relations among notions and analysis of the generic composition paradigm / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in cryptology -- CT-RSA 2014. The cryptographer's track at the RSA conference 2014, San Francisco, CA, USA, February 25--28, 2014. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Indifferentiability of the Sponge Construction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sponge-Based Pseudo-Random Number Generators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Indifferentiability Security Analysis of chopMD Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweaking Even-Mansour Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Lambert \(w\) function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Full-state keyed duplex with built-in multi-user support / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Ascon / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8--12, 2016. Proceedings. Part I / rank
 
Normal rank
Property / cites work
 
Property / cites work: McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Provably Robust Sponge-Based PRNGs and KDFs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16--20, 2015. Proceedings. Part I / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4940697 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: The PHOTON Family of Lightweight Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW / rank
 
Normal rank
Property / cites work
 
Property / cites work: Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robust Authenticated-Encryption AEZ and the Problem That It Solves / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Multi-user Security of Double Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3622892 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking and Repairing GCM Security Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3046361 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of MDC-2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Software Performance of Authenticated-Encryption Modes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Progress in Cryptology - INDOCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probability and Computing / rank
 
Normal rank
Property / cites work
 
Property / cites work: ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4856179 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Round-Reduced $$\mathtt{LED}$$ / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3579593 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341676 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4247202 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14--18, 2016. Proceedings. Part I / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Provable-Security Treatment of the Key-Wrap Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation / rank
 
Normal rank
Property / cites work
 
Property / cites work: CBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7--11, 2014. Proceedings, Part I / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Incorporate Associated Data in Sponge-Based Authenticated Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Birthday Paradox for Multi-collisions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 -- June 1, 2006. Proceedings. / rank
 
Normal rank

Latest revision as of 04:37, 20 July 2024

scientific article
Language Label Description Also known as
English
Beyond conventional security in sponge-based authenticated encryption modes
scientific article

    Statements

    Beyond conventional security in sponge-based authenticated encryption modes (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    13 August 2019
    0 references
    0 references
    authenticated encryption
    0 references
    CAESAR
    0 references
    Ascon
    0 references
    CBEAM
    0 references
    ICEPOLE
    0 references
    Keyak
    0 references
    NORX
    0 references
    PRIMATEs
    0 references
    STRIBOB
    0 references
    multi-collisions
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references