Reconsidering Generic Composition

From MaRDI portal
Revision as of 03:17, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5418700

DOI10.1007/978-3-642-55220-5_15zbMath1332.94092OpenAlexW2170822045MaRDI QIDQ5418700

Chanathip Namprempre, Phillip Rogaway, Thomas Shrimpton

Publication date: 27 May 2014

Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_15



Related Items

\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption, Rogue Decryption Failures: Reconciling AE Robustness Notions, Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds, Hiding in plain sight: memory-tight proofs via randomness programming, Efficient schemes for committing authenticated encryption, Secure storage -- confidentiality and authentication, Integrity Analysis of Authenticated Encryption Based on Stream Ciphers, Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more, Secret can be public: low-memory AEAD mode for high-order masking, On committing authenticated-encryption, Authenticated Encryption with Variable Stretch, A modular approach to the incompressibility of block-cipher-based AEADs, On the related-key attack security of authenticated encryption schemes, \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher, Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels, Sponge-based authenticated encryption: security against quantum attackers, Implicit key-stretching security of encryption schemes, ACE in chains: how risky is CBC encryption of binary executable files?, RIV for Robust Authenticated Encryption, The design and evolution of OCB, The \texttt{Deoxys} AEAD family, Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers, The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3, A symmetric cryptographic scheme for data integrity verification in cloud databases