The Missing Difference problem, and its applications to counter mode encryption
From MaRDI portal
Publication:1648860
DOI10.1007/978-3-319-78375-8_24zbMATH Open1428.94084OpenAlexW2794617439MaRDI QIDQ1648860FDOQ1648860
Authors: Gaëtan Leurent, Ferdinand Sibleyras
Publication date: 9 July 2018
Full work available at URL: https://hal.inria.fr/hal-01961739/file/ctrcryptbm.pdf
Recommendations
Cites Work
- Fast Software Encryption
- Title not available (Why is that?)
- Title not available (Why is that?)
- Differential cryptanalysis of DES-like cryptosystems
- Title not available (Why is that?)
- Progress in Cryptology - INDOCRYPT 2004
- Title not available (Why is that?)
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- The block cipher \textsc{Square}
- Generic universal forgery attack on iterative hash-based MACs
- Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant
- On weak keys and forgery attacks against polynomial-based MAC schemes
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- Updates on generic attacks against HMAC and NMAC
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
- Cycling attacks on GCM, GHASH and other polynomial MACs and hashes
- Collision attacks against CAESAR candidates. Forgery and key-recovery against AEZ and Marble
- New generic attacks against hash-based MACs
- Improved generic attacks against hash-based MACs and HAIFA
- On the security of two MAC algorithms
- New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
Cited In (1)
This page was built for publication: The Missing Difference problem, and its applications to counter mode encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1648860)