Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
From MaRDI portal
Publication:2820486
DOI10.1007/978-3-662-49890-3_11zbMATH Open1384.94065OpenAlexW2290117735MaRDI QIDQ2820486FDOQ2820486
Authors: Robert Granger, Philipp Jovanovic, Bart Mennink, Samuel Neves
Publication date: 9 September 2016
Published in: Advances in Cryptology – EUROCRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-49890-3_11
Recommendations
- Selected Areas in Cryptography
- Tweakable blockciphers with asymptotically optimal security
- Provably secure higher-order masking of AES
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Optimally secure tweakable blockciphers
- Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
- New instantiations of the CRYPTO 2017 masking schemes
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- A fast and provably secure higher-order masking of AES S-box
- On masked Galois-field multiplication for authenticated encryption resistant to side channel analysis
Cited In (32)
- Computation of a 30750-bit binary field discrete logarithm
- On the resilience of Even-Mansour to invariant permutations
- Reducing the cost of authenticity with leakages: a CIML2-secure AE scheme with one call to a strongly protected tweakable block cipher
- Tight security of cascaded LRW2
- How to build fully secure tweakable blockciphers from classical blockciphers
- Towards tight security of cascaded LRW2
- XPX: generalized tweakable Even-Mansour with improved security guarantees
- Related-key almost universal hash functions: definitions, constructions and applications
- Beyond conventional security in sponge-based authenticated encryption modes
- Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch
- Effective and efficient masking with low noise using small-Mersenne-prime ciphers
- Faster individual discrete logarithms in finite fields of composite extension degree
- Offset-based BBB-secure tweakable block-ciphers with updatable caches
- Connecting tweakable and multi-key blockcipher security
- Breaking LWC candidates: sESTATE and Elephant in quantum setting
- Multi-user security of the Elephant v2 authenticated encryption mode
- Farasha: a provable permutation-based parallelizable PRF
- Tweaking key-alternating Feistel block ciphers
- Quantum cryptanalysis of OTR and OPP: attacks on confidentiality, and key-recovery
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Tight security of \textsf{TNT} and beyond. Attacks, proofs and possibilities for the cascaded \textsf{LRW} paradigm
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- Title not available (Why is that?)
- RIV for robust authenticated encryption
- Mystrium: wide block encryption efficient on entry-level processors
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code
- Tornado: automatic generation of probing-secure masked bitsliced implementations
- An observation on NORX, BLAKE2, and ChaCha
- Cryptanalysis of OCB2: attacks on authenticity and confidentiality
This page was built for publication: Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2820486)