Beyond birthday bound secure fresh rekeying: application to authenticated encryption
From MaRDI portal
Publication:2692358
DOI10.1007/978-3-030-64837-4_21OpenAlexW3091427978MaRDI QIDQ2692358
Publication date: 21 March 2023
Full work available at URL: https://doi.org/10.1007/978-3-030-64837-4_21
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Extremal problems in discrete geometry
- Towards tight security of cascaded LRW2
- ZMAC: a fast tweakable block cipher mode for highly secure message authentication
- Information-theoretic indistinguishability via the chi-squared method
- A formal treatment of multi-key channels
- Insuperability of the standard versus ideal model gap for tweakable blockcipher security
- Improved side-channel analysis of finite-field multiplication
- Horizontal side-channel attacks and countermeasures on the ISW masking scheme
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- XHX -- a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing
- Authenticated encryption in the face of protocol and side channel leakage
- Connecting tweakable and multi-key blockcipher security
- Midori: A Block Cipher for Low Energy
- Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Parallelizable and Authenticated Online Ciphers
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- Side-Channel Analysis of Multiplications in GF(2128)
- Soft Analytical Side-Channel Attacks
- Tweakable Blockciphers with Asymptotically Optimal Security
- Optimally Secure Tweakable Blockciphers
- Robust Authenticated-Encryption AEZ and the Problem That It Solves
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
- The Software Performance of Authenticated-Encryption Modes
- The LED Block Cipher
- Piccolo: An Ultra-Lightweight Blockcipher
- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Tweak-Length Extension for Tweakable Blockciphers
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- PRESENT: An Ultra-Lightweight Block Cipher
- Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- Masking against Side-Channel Attacks: A Formal Security Proof
- Towards sound approaches to counteract power-analysis attacks
- GIFT: A Small Present
- Power Analysis Attacks
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
- Advances in Cryptology - CRYPTO 2003
- Improved Security Analysis of XEX and LRW Modes
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
- Cryptanalysis of OCB2: attacks on authenticity and confidentiality
This page was built for publication: Beyond birthday bound secure fresh rekeying: application to authenticated encryption