Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
From MaRDI portal
Publication:2835582
DOI10.1007/978-3-662-53018-4_2zbMATH Open1351.94063OpenAlexW2406798186MaRDI QIDQ2835582FDOQ2835582
Authors: Thomas Peyrin, Yannick Seurin
Publication date: 30 November 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53018-4_2
Recommendations
- Tweakable block ciphers
- scientific article; zbMATH DE number 1942411
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Tweakable enciphering schemes using only the encryption function of a block cipher
- Optimally secure tweakable blockciphers
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- The counter mode with encrypted nonces and its extension to authenticated encryption
authenticated encryptiontweakable block cipherCAESAR competitionbeyond-birthday-bound securitynonce-misuse resistance
Cites Work
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- McOE: a family of almost foolproof on-line authenticated encryption schemes
- New hash functions and their use in authentication and set equality
- Title not available (Why is that?)
- On fast and provably secure message authentication based on universal hashing
- Tight security bounds for key-alternating ciphers
- Title not available (Why is that?)
- Title not available (Why is that?)
- Progress in Cryptology - INDOCRYPT 2004
- Fast Software Encryption
- The security of the cipher block chaining message authentication code
- Title not available (Why is that?)
- Parallelizable and authenticated online ciphers
- Pipelineable on-line encryption
- The software performance of authenticated-encryption modes
- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
- A Provable-Security Treatment of the Key-Wrap Problem
- Title not available (Why is that?)
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Title not available (Why is that?)
- The “Coefficients H” Technique
- A new variant of PMAC: beyond the birthday bound
- Characterization of security notions for probabilistic private-key encryption
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- Domain extension for MACs beyond the birthday barrier
- How to securely release unverified plaintext in authenticated encryption
- Optimally secure tweakable blockciphers
- Encryption modes with almost free message integrity
- Authenticated Encryption Mode for Beyond the Birthday Bound Security
- Reconsidering generic composition
- Robust authenticated-encryption AEZ and the problem that it solves
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
- Fast Software Encryption
- Title not available (Why is that?)
- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Tweakable blockciphers with asymptotically optimal security
- The indistinguishability of the XOR of \(k\) permutations
- The sum of PRPs is a secure PRF
- New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
- Title not available (Why is that?)
- A modular framework for building variable-input-length tweakable ciphers
Cited In (38)
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Implicit key-stretching security of encryption schemes
- Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Reducing the cost of authenticity with leakages: a CIML2-secure AE scheme with one call to a strongly protected tweakable block cipher
- Tight security of cascaded LRW2
- Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption
- Towards tight security of cascaded LRW2
- Authenticated Encryption Mode for Beyond the Birthday Bound Security
- The counter mode with encrypted nonces and its extension to authenticated encryption
- IQRA: Incremental Quadratic Re-keying friendly Authentication scheme
- The design and evolution of OCB
- Beyond conventional security in sponge-based authenticated encryption modes
- Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch
- Toward a fully secure authenticated encryption scheme from a pseudorandom permutation
- Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC
- Offset-based BBB-secure tweakable block-ciphers with updatable caches
- Connecting tweakable and multi-key blockcipher security
- Towards closing the security gap of Tweak-aNd-Tweak (TNT)
- ZLR: a fast online authenticated encryption scheme achieving full security
- Farasha: a provable permutation-based parallelizable PRF
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function
- The \texttt{Deoxys} AEAD family
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Impossible differential cryptanalysis of reduced-round \texttt{SKINNY}
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Tight security of \textsf{TNT} and beyond. Attacks, proofs and possibilities for the cascaded \textsf{LRW} paradigm
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)
- Integral Cryptanalysis of Reduced-Round Tweakable TWINE
- Incremental cryptography revisited: PRFs, nonces and modular design
- Cryptanalysis of the TAE mode and its improvement
- Minimizing the two-round tweakable Even-Mansour cipher
- Reconsidering generic composition: the modes A10, A11 and A12 are insecure
- An Inverse-Free Single-Keyed Tweakable Enciphering Scheme
- Polye+CTR: a swiss-army-knife mode for block ciphers
- Beyond birthday bound secure MAC in faulty nonce model
Uses Software
This page was built for publication: Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2835582)