Reconsidering Generic Composition
From MaRDI portal
Publication:5418700
DOI10.1007/978-3-642-55220-5_15zbMath1332.94092OpenAlexW2170822045MaRDI QIDQ5418700
Chanathip Namprempre, Phillip Rogaway, Thomas Shrimpton
Publication date: 27 May 2014
Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_15
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items
\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption, Rogue Decryption Failures: Reconciling AE Robustness Notions, Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds, Hiding in plain sight: memory-tight proofs via randomness programming, Efficient schemes for committing authenticated encryption, Secure storage -- confidentiality and authentication, Integrity Analysis of Authenticated Encryption Based on Stream Ciphers, Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more, Secret can be public: low-memory AEAD mode for high-order masking, On committing authenticated-encryption, Authenticated Encryption with Variable Stretch, A modular approach to the incompressibility of block-cipher-based AEADs, On the related-key attack security of authenticated encryption schemes, \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher, Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels, Sponge-based authenticated encryption: security against quantum attackers, Implicit key-stretching security of encryption schemes, ACE in chains: how risky is CBC encryption of binary executable files?, RIV for Robust Authenticated Encryption, The design and evolution of OCB, The \texttt{Deoxys} AEAD family, Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers, The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3, A symmetric cryptographic scheme for data integrity verification in cloud databases