Weak Keys for AEZ, and the External Key Padding Attack
From MaRDI portal
Publication:2975806
DOI10.1007/978-3-319-52153-4_13zbMath1383.94032OpenAlexW2568266987MaRDI QIDQ2975806
Publication date: 12 April 2017
Published in: Topics in Cryptology – CT-RSA 2017 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-52153-4_13
Cites Work
- Unnamed Item
- Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
- Collision Attacks Against CAESAR Candidates
- Parallelizable and Authenticated Online Ciphers
- BLAKE2: Simpler, Smaller, Fast as MD5
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes
- How to Securely Release Unverified Plaintext in Authenticated Encryption
- On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes
- Robust Authenticated-Encryption AEZ and the Problem That It Solves
- The Software Performance of Authenticated-Encryption Modes
- Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE
- Rogue Decryption Failures: Reconciling AE Robustness Notions
- A Provable-Security Treatment of the Key-Wrap Problem
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
- Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation
- Analysis of BLAKE2
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
This page was built for publication: Weak Keys for AEZ, and the External Key Padding Attack