Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
New item
In other projects
MaRDI portal item
Discussion
View source
View history
English
Log in

Forgery and subkey recovery on CAESAR candidate iFeed

From MaRDI portal
Publication:2807205
Jump to:navigation, search

DOI10.1007/978-3-319-31301-6_11zbMATH Open1396.94099OpenAlexW2467108772MaRDI QIDQ2807205FDOQ2807205

Willem Schroé, Bart Mennink, Bart Preneel, E. A. Andreeva

Publication date: 19 May 2016

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-319-31301-6_11




Recommendations

  • Reforgeability of authenticated encryption schemes
  • Can CAESAR beat Galois? Robustness of CAESAR candidates against nonce reusing and high data complexity attacks
  • Forgery Attacks on Round-Reduced ICEPOLE-128
  • Cryptanalysis of \texttt{NORX} v2.0
  • Forgery attacks on FlexAE and FlexAEAD


zbMATH Keywords

forgeryCAESARbreaking forward secrecyiFeedsubkey recovery


Mathematics Subject Classification ID

Cryptography (94A60)


Cites Work

  • How to Securely Release Unverified Plaintext in Authenticated Encryption


Cited In (2)

  • Blockcipher-based authenticated encryption: how small can we go?
  • Cryptanalysis of OCB2: attacks on authenticity and confidentiality





This page was built for publication: Forgery and subkey recovery on CAESAR candidate iFeed

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2807205)

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:2807205&oldid=15715552"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 3 February 2024, at 17:44. Warning: Page may not contain recent updates.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki