Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
From MaRDI portal
Publication:2820486
Recommendations
- Selected Areas in Cryptography
- Tweakable blockciphers with asymptotically optimal security
- Provably secure higher-order masking of AES
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Optimally secure tweakable blockciphers
- Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
- New instantiations of the CRYPTO 2017 masking schemes
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- A fast and provably secure higher-order masking of AES S-box
- On masked Galois-field multiplication for authenticated encryption resistant to side channel analysis
Cited in
(32)- Quantum cryptanalysis of OTR and OPP: attacks on confidentiality, and key-recovery
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- Related-key almost universal hash functions: definitions, constructions and applications
- How to build fully secure tweakable blockciphers from classical blockciphers
- On the resilience of Even-Mansour to invariant permutations
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code
- Breaking LWC candidates: sESTATE and Elephant in quantum setting
- Towards tight security of cascaded LRW2
- scientific article; zbMATH DE number 1979284 (Why is no real title available?)
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Multi-user security of the Elephant v2 authenticated encryption mode
- Farasha: a provable permutation-based parallelizable PRF
- Tornado: automatic generation of probing-secure masked bitsliced implementations
- Offset-based BBB-secure tweakable block-ciphers with updatable caches
- Connecting tweakable and multi-key blockcipher security
- Effective and efficient masking with low noise using small-Mersenne-prime ciphers
- Computation of a 30750-bit binary field discrete logarithm
- Tight security of \textsf{TNT} and beyond. Attacks, proofs and possibilities for the cascaded \textsf{LRW} paradigm
- Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch
- RIV for robust authenticated encryption
- Tweaking key-alternating Feistel block ciphers
- Reducing the cost of authenticity with leakages: a CIML2-secure AE scheme with one call to a strongly protected tweakable block cipher
- An observation on NORX, BLAKE2, and ChaCha
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations
- Cryptanalysis of OCB2: attacks on authenticity and confidentiality
- Tight security of cascaded LRW2
- XPX: generalized tweakable Even-Mansour with improved security guarantees
- Faster individual discrete logarithms in finite fields of composite extension degree
- Mystrium: wide block encryption efficient on entry-level processors
- Beyond conventional security in sponge-based authenticated encryption modes
This page was built for publication: Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2820486)