Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
From MaRDI portal
Publication:2835582
Recommendations
- Tweakable block ciphers
- scientific article; zbMATH DE number 1942411
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Tweakable enciphering schemes using only the encryption function of a block cipher
- Optimally secure tweakable blockciphers
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- The counter mode with encrypted nonces and its extension to authenticated encryption
Cites work
- scientific article; zbMATH DE number 1583788 (Why is no real title available?)
- scientific article; zbMATH DE number 1583804 (Why is no real title available?)
- scientific article; zbMATH DE number 1722692 (Why is no real title available?)
- scientific article; zbMATH DE number 3960854 (Why is no real title available?)
- scientific article; zbMATH DE number 1942411 (Why is no real title available?)
- scientific article; zbMATH DE number 2086719 (Why is no real title available?)
- scientific article; zbMATH DE number 2086729 (Why is no real title available?)
- scientific article; zbMATH DE number 1842499 (Why is no real title available?)
- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
- A Provable-Security Treatment of the Key-Wrap Problem
- A modular framework for building variable-input-length tweakable ciphers
- A new variant of PMAC: beyond the birthday bound
- Authenticated Encryption Mode for Beyond the Birthday Bound Security
- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher
- Characterization of security notions for probabilistic private-key encryption
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Domain extension for MACs beyond the birthday barrier
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Encryption modes with almost free message integrity
- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
- Fast Software Encryption
- Fast Software Encryption
- How to securely release unverified plaintext in authenticated encryption
- McOE: a family of almost foolproof on-line authenticated encryption schemes
- New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
- New hash functions and their use in authentication and set equality
- On fast and provably secure message authentication based on universal hashing
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
- Optimally secure tweakable blockciphers
- Parallelizable and authenticated online ciphers
- Pipelineable on-line encryption
- Progress in Cryptology - INDOCRYPT 2004
- Reconsidering generic composition
- Robust authenticated-encryption AEZ and the problem that it solves
- The indistinguishability of the XOR of \(k\) permutations
- The security of the cipher block chaining message authentication code
- The software performance of authenticated-encryption modes
- The sum of PRPs is a secure PRF
- The “Coefficients H” Technique
- Tight security bounds for key-alternating ciphers
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- Tweakable blockciphers with asymptotically optimal security
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
Cited in
(38)- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Implicit key-stretching security of encryption schemes
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Reducing the cost of authenticity with leakages: a CIML2-secure AE scheme with one call to a strongly protected tweakable block cipher
- Tight security of cascaded LRW2
- Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels
- Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption
- Towards tight security of cascaded LRW2
- Authenticated Encryption Mode for Beyond the Birthday Bound Security
- The counter mode with encrypted nonces and its extension to authenticated encryption
- The design and evolution of OCB
- IQRA: Incremental Quadratic Re-keying friendly Authentication scheme
- Beyond conventional security in sponge-based authenticated encryption modes
- Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch
- Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC
- Connecting tweakable and multi-key blockcipher security
- Toward a fully secure authenticated encryption scheme from a pseudorandom permutation
- Offset-based BBB-secure tweakable block-ciphers with updatable caches
- Towards closing the security gap of Tweak-aNd-Tweak (TNT)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- ZLR: a fast online authenticated encryption scheme achieving full security
- Farasha: a provable permutation-based parallelizable PRF
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function
- The \texttt{Deoxys} AEAD family
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Impossible differential cryptanalysis of reduced-round \texttt{SKINNY}
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)
- Tight security of \textsf{TNT} and beyond. Attacks, proofs and possibilities for the cascaded \textsf{LRW} paradigm
- Incremental cryptography revisited: PRFs, nonces and modular design
- Integral Cryptanalysis of Reduced-Round Tweakable TWINE
- Cryptanalysis of the TAE mode and its improvement
- Minimizing the two-round tweakable Even-Mansour cipher
- Reconsidering generic composition: the modes A10, A11 and A12 are insecure
- An Inverse-Free Single-Keyed Tweakable Enciphering Scheme
- Polye+CTR: a swiss-army-knife mode for block ciphers
- Beyond birthday bound secure MAC in faulty nonce model
This page was built for publication: Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2835582)