Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications

From MaRDI portal
Publication:2889879


DOI10.1007/978-3-642-28496-0_19zbMath1292.94030MaRDI QIDQ2889879

Michaël Peeters, Guido Bertoni, Joan Daemen, Gilles Van Assche

Publication date: 8 June 2012

Published in: Selected Areas in Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-28496-0_19


94A60: Cryptography


Related Items

New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length, Cryptanalysis of Reduced NORX, Practical forgeries for ORANGE, Open problems in hash function security, Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method, Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes, Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje, sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives, Signcryption schemes with insider security in an ideal permutation model, Cryptanalysis of \texttt{NORX} v2.0, Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode, An observation on NORX, BLAKE2, and ChaCha, Troika: a ternary cryptographic hash function, Beyond conventional security in sponge-based authenticated encryption modes, Quark: a lightweight hash, MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes, How to Incorporate Associated Data in Sponge-Based Authenticated Encryption, A New Mode of Operation for Incremental Authenticated Encryption with Associated Data, Forgery Attacks on Round-Reduced ICEPOLE-128, XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees, Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications, ASC-1: An Authenticated Encryption Stream Cipher, Analysis of NORX: Investigating Differential and Rotational Properties, Cryptographic Applications of the Duplex Construction, Weak Keys for AEZ, and the External Key Padding Attack, Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message, sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices, Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance


Uses Software


Cites Work