Authenticated encryption: relations among notions and analysis of the generic composition paradigm

From MaRDI portal
Publication:1021246

DOI10.1007/S00145-008-9026-XzbMath1161.94435OpenAlexW2165214731WikidataQ121423327 ScholiaQ121423327MaRDI QIDQ1021246

Mihir Bellare, Chanathip Namprempre

Publication date: 8 June 2009

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-008-9026-x




Related Items (24)

On fingerprinting attacks and length-hiding encryptionsp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained DevicesHiding in plain sight: memory-tight proofs via randomness programmingImproved, black-box, non-malleable encryption from semantic securityContext discovery and commitment attacks. How to break CCM, EAX, SIV, and moreOffset-based BBB-secure tweakable block-ciphers with updatable cachesOn security notions for encryption in a quantum worldAuthenticated confidential channel establishment and the security of TLS-DHECCA updatable encryption against malicious re-encryption attacksPacked multiplication: how to amortize the cost of side-channel masking?Unnamed ItemThe design and evolution of OCBThe Software Performance of Authenticated-Encryption ModesLinearly Homomorphic Authenticated Encryption with Provable Correctness and Public VerifiabilityA Calculus for Game-Based Security ProofsBreaking LWC candidates: sESTATE and Elephant in quantum settingThe Counter mode with encrypted nonces and its extension to authenticated encryptionAuthenticated Encryption with Small Stretch (or, How to Accelerate AERO)On the Security of the LAC Authenticated Encryption AlgorithmGeneric Construction of Stateful Identity Based EncryptionBeyond conventional security in sponge-based authenticated encryption modesFast and secure updatable encryptionPrivacy-preserving authenticated key exchange for constrained devicesSingle-trace side-channel analysis on polynomial-based MAC schemes




Cites Work




This page was built for publication: Authenticated encryption: relations among notions and analysis of the generic composition paradigm