Multi-user BBB security of public permutations based MAC
From MaRDI portal
Publication:2088959
DOI10.1007/s12095-022-00571-wzbMath1499.94037OpenAlexW4280523578WikidataQ114849140 ScholiaQ114849140MaRDI QIDQ2088959
Mridul Nandi, Yu Long Chen, Avijit Dutta
Publication date: 6 October 2022
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-022-00571-w
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- New hash functions and their use in authentication and set equality
- A construction of a cipher from a single pseudorandom permutation.
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds
- Encrypt or decrypt -- to make a single-key beyond birthday secure nonce-based MAC
- Analyzing multi-key security degradation
- Full-state keyed duplex with built-in multi-user support
- Analysis of the single-permutation encrypted Davies-Meyer construction
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- Mind the composition: birthday bound attacks on EWCDMD and SoKAC21
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting
- How to build pseudorandom functions from public random permutations
- \(\mathsf{DWCDM}_+\): a BBB secure nonce based MAC
- Beyond birthday bound secure MAC in faulty nonce model
- Improved security analysis for nonce-based enhanced hash-then-mask MACs
- On the adaptive security of MACs and PRFs
- Hash-Function Based PRFs: AMAC and Its Multi-User Security
- Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
- The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3
- Another Look at Tightness
- Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal
- Multi-key Security: The Even-Mansour Construction Revisited
- Improved security analysis of PMAC
- How to Thwart Birthday Attacks against MACs via Small Randomness
- The “Coefficients H” Technique
- A MAC Mode for Lightweight Block Ciphers
- Keccak
- BBB Secure Nonce Based MAC Using Public Permutations
- The PHOTON Family of Lightweight Hash Functions
- SPONGENT: The Design Space of Lightweight Cryptographic Hashing
- Improved Time-Memory Trade-Offs with Multiple Data
- The Multi-user Security of Double Encryption
This page was built for publication: Multi-user BBB security of public permutations based MAC