Sponges resist leakage: the case of authenticated encryption
From MaRDI portal
Publication:2176648
Recommendations
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
- Sponge-based authenticated encryption: security against quantum attackers
- Authenticated encryption in the face of protocol and side channel leakage
- How to incorporate associated data in sponge-based authenticated encryption
- Beyond conventional security in sponge-based authenticated encryption modes
Cited in
(19)- Sponge-based authenticated encryption: security against quantum attackers
- On the security of triplex- and multiplex-type constructions with smaller tweaks
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
- No-leak authentication by the Sherlock Holmes method
- Lightweight authenticated encryption mode suitable for threshold implementation
- On the related-key attack security of authenticated encryption schemes
- Authenticated encryption in the face of protocol and side channel leakage
- Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- How to incorporate associated data in sponge-based authenticated encryption
- \textsf{ISAP+}: \textsf{ISAP} with fast authentication
- Secure two-party computation in a quantum world
- A modular approach to the incompressibility of block-cipher-based AEADs
- Lightweight leakage-resilient PRNG from TBCs using superposition
- Sp-AELM: sponge based authenticated encryption scheme for memory constrained devices
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption
- Efficient leakage-resilient MACs without idealized assumptions
- \textsf{LR-OT}: leakage-resilient oblivious transfer
- Security of Keyed Sponge Constructions Using a Modular Proof Approach
This page was built for publication: Sponges resist leakage: the case of authenticated encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2176648)