Authenticated encryption: relations among notions and analysis of the generic composition paradigm
From MaRDI portal
Publication:1021246
DOI10.1007/S00145-008-9026-XzbMath1161.94435OpenAlexW2165214731WikidataQ121423327 ScholiaQ121423327MaRDI QIDQ1021246
Mihir Bellare, Chanathip Namprempre
Publication date: 8 June 2009
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-008-9026-x
Related Items (24)
On fingerprinting attacks and length-hiding encryption ⋮ sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices ⋮ Hiding in plain sight: memory-tight proofs via randomness programming ⋮ Improved, black-box, non-malleable encryption from semantic security ⋮ Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more ⋮ Offset-based BBB-secure tweakable block-ciphers with updatable caches ⋮ On security notions for encryption in a quantum world ⋮ Authenticated confidential channel establishment and the security of TLS-DHE ⋮ CCA updatable encryption against malicious re-encryption attacks ⋮ Packed multiplication: how to amortize the cost of side-channel masking? ⋮ Unnamed Item ⋮ The design and evolution of OCB ⋮ The Software Performance of Authenticated-Encryption Modes ⋮ Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability ⋮ A Calculus for Game-Based Security Proofs ⋮ Breaking LWC candidates: sESTATE and Elephant in quantum setting ⋮ The Counter mode with encrypted nonces and its extension to authenticated encryption ⋮ Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) ⋮ On the Security of the LAC Authenticated Encryption Algorithm ⋮ Generic Construction of Stateful Identity Based Encryption ⋮ Beyond conventional security in sponge-based authenticated encryption modes ⋮ Fast and secure updatable encryption ⋮ Privacy-preserving authenticated key exchange for constrained devices ⋮ Single-trace side-channel analysis on polynomial-based MAC schemes
Cites Work
- The security of the IAPM and IACBC modes
- Probabilistic encryption
- A uniform-complexity treatment of encryption and zero-knowledge
- CBC MAC for real-time data sources
- Characterization of security notions for probabilistic private-key encryption
- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
- Keying Hash Functions for Message Authentication
- Breaking and provably repairing the SSH authenticated encryption scheme
- A Provable-Security Treatment of the Key-Wrap Problem
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Nonmalleable Cryptography
- Encyclopedia of Cryptography and Security
- Improved Security Analyses for CBC MACs
- Progress in Cryptology - INDOCRYPT 2004
- Fast Software Encryption
- Fast Software Encryption
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
- Fast Software Encryption
- Fast Software Encryption
- The security of the cipher block chaining message authentication code
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Authenticated encryption: relations among notions and analysis of the generic composition paradigm