The security of the OCB mode of operation without the SPRP assumption
From MaRDI portal
Publication:2856166
DOI10.1007/978-3-642-41227-1_12zbMATH Open1319.94050OpenAlexW2153685618MaRDI QIDQ2856166FDOQ2856166
Authors: Kazumaro Aoki, Kan Yasuda
Publication date: 23 October 2013
Published in: Provable Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-41227-1_12
Recommendations
PRPkey separationunpredictabilityintegritynonceSPRPauthenticated decryptionbackward attemptforward-only attempttag truncation
Cited In (13)
- Optimized Self-Synchronizing Mode of Operation
- On the optimality of non-linear computations for symmetric key primitives
- The design and evolution of OCB
- XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation
- Offset-based BBB-secure tweakable block-ciphers with updatable caches
- A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality
- The software performance of authenticated-encryption modes
- Breaking the IOC authenticated encryption mode
- Cryptanalysis of OCB2: attacks on authenticity and confidentiality
- Improved security for OCB3
- INT-RUP security of checksum-based authenticated encryption
- COBRA: a parallelizable authenticated online cipher without block cipher inverse
- Cryptanalysis of OCB2: attacks on authenticity and confidentiality
This page was built for publication: The security of the OCB mode of operation without the SPRP assumption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2856166)