Beyond conventional security in sponge-based authenticated encryption modes
From MaRDI portal
Publication:2318091
DOI10.1007/s00145-018-9299-7zbMath1443.94064OpenAlexW2808217567WikidataQ121215747 ScholiaQ121215747MaRDI QIDQ2318091
Philipp Jovanovic, Yu Sasaki, Atul Luykx, Kan Yasuda, Bart Mennink
Publication date: 13 August 2019
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-018-9299-7
Related Items (2)
Generic attack on duplex-based AEAD modes using random function statistics ⋮ Lightweight authenticated encryption mode suitable for threshold implementation
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Advances in cryptology -- EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8--12, 2016. Proceedings. Part I
- Advances in cryptology -- ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7--11, 2014. Proceedings, Part I
- Advances in cryptology -- EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 -- June 1, 2006. Proceedings.
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- Full-state keyed duplex with built-in multi-user support
- On the Lambert \(w\) function
- Topics in cryptology -- CT-RSA 2014. The cryptographer's track at the RSA conference 2014, San Francisco, CA, USA, February 25--28, 2014. Proceedings
- Advances in cryptology -- CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16--20, 2015. Proceedings. Part I
- Advances in cryptology -- CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14--18, 2016. Proceedings. Part I
- How to Incorporate Associated Data in Sponge-Based Authenticated Encryption
- Cryptanalysis of Ascon
- Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
- Provably Robust Sponge-Based PRNGs and KDFs
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
- Parallelizable and Authenticated Online Ciphers
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Breaking and Repairing GCM Security Proofs
- Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks
- Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes
- Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
- Cryptanalysis of Round-Reduced $$\mathtt{LED}$$
- APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
- Security of Keyed Sponge Constructions Using a Modular Proof Approach
- Robust Authenticated-Encryption AEZ and the Problem That It Solves
- The Software Performance of Authenticated-Encryption Modes
- A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW
- Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing
- Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC
- Tweaking Even-Mansour Ciphers
- The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC
- Improved Indifferentiability Security Analysis of chopMD Hash Function
- Sponge-Based Pseudo-Random Number Generators
- A Provable-Security Treatment of the Key-Wrap Problem
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Cryptanalysis of MDC-2
- New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length
- McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
- StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012
- The PHOTON Family of Lightweight Hash Functions
- NORX: Parallel and Scalable AEAD
- ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption
- Birthday Paradox for Multi-collisions
- CBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ Functions
- Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation
- Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
- On the Indifferentiability of the Sponge Construction
- Probability and Computing
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Progress in Cryptology - INDOCRYPT 2004
- Fast Software Encryption
- The Multi-user Security of Double Encryption
- A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations
- Theory of Cryptography
This page was built for publication: Beyond conventional security in sponge-based authenticated encryption modes