Duplexing the sponge: Single-pass authenticated encryption and other applications
DOI10.1007/978-3-642-28496-0_19zbMATH Open1292.94030OpenAlexW1503638523MaRDI QIDQ2889879FDOQ2889879
Authors: Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
Publication date: 8 June 2012
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-28496-0_19
Recommendations
- Cryptographic applications of the duplex construction
- Security of full-state keyed sponge and duplex: applications to authenticated encryption
- Full-state keyed duplex with built-in multi-user support
- Beyond \(2^{c/2}\) security in sponge-based authenticated encryption modes
- Beyond conventional security in sponge-based authenticated encryption modes
provable securityauthenticated encryptionKeccakduplex constructionkey wrappingpseudo-random bit sequence generatorsponge functions
Cites Work
- Quark: a lightweight hash
- Keccak
- Careful with composition: limitations of the indifferentiability framework
- On the Indifferentiability of the Sponge Construction
- Theory of Cryptography
- Title not available (Why is that?)
- A Provable-Security Treatment of the Key-Wrap Problem
- The Grindahl Hash Functions
- The PHOTON family of lightweight hash functions
- Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26--28, 2007. Revised selected papers
- Sponge-based pseudo-random number generators
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- Slide Attacks on a Class of Hash Functions
- Title not available (Why is that?)
- Cryptographic hardware and embedded systems -- CHES 2010. 12th international workshop, Santa Barbara, USA, August 17--20, 2010. Proceedings
- Helix: fast encryption and authentication in a single cryptographic primitive.
- Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5--7, 2004. Revised papers.
- Fast Software Encryption
- Differential-Linear Attacks Against the Stream Cipher Phelix
- Information Security and Privacy
Cited In (85)
- Signcryption schemes with insider security in an ideal permutation model
- Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives
- Jammin' on the deck
- Quark: a lightweight hash
- Analysis of NORX: investigating differential and rotational properties
- Cryptanalysis of the AEAD and hash algorithm DryGASCON
- Sponge based CCA2 secure asymmetric encryption for arbitrary length message
- Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation
- Lightweight authenticated encryption mode suitable for threshold implementation
- Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode
- Cryptanalysis of reduced NORX
- Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje
- Cryptanalysis of \texttt{NORX} v2.0
- Full-state keyed duplex with built-in multi-user support
- Security of full-state keyed sponge and duplex: applications to authenticated encryption
- XPX: generalized tweakable Even-Mansour with improved security guarantees
- Weak keys for AEZ, and the external key padding attack
- New bounds for keyed sponges with extendable output: independence between capacity and message length
- A New Mode of Operation for Incremental Authenticated Encryption with Associated Data
- Sp-AELM: sponge based authenticated encryption scheme for memory constrained devices
- Beyond conventional security in sponge-based authenticated encryption modes
- Troika: a ternary cryptographic hash function
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method
- How to incorporate associated data in sponge-based authenticated encryption
- Double-block-length hash function for minimum memory size
- Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT
- Forgery Attacks on Round-Reduced ICEPOLE-128
- MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes
- The Oribatida v1.3 family of lightweight authenticated encryption schemes
- Security analysis of subterranean 2.0
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
- StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Security of Keyed Sponge Constructions Using a Modular Proof Approach
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}
- \textsc{Friet}: an authenticated encryption scheme with built-in fault detection
- Mind the composition: birthday bound attacks on EWCDMD and SoKAC21
- Compactness of hashing modes and efficiency beyond Merkle tree
- Triangulating rebound attack on AES-like hashing
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
- Automatic verification of differential characteristics: application to reduced Gimli
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations
- Algebraic key-recovery attacks on reduced-round Xoofff
- Open problems in hash function security
- Sufficient conditions on padding schemes of sponge construction and sponge-based authenticated-encryption scheme
- Cryptographic applications of the duplex construction
- Practical forgeries for ORANGE
- Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC
- New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions
- ASC-1: an authenticated encryption stream cipher
- PPAE: practical parazoa authenticated encryption family
- CBEAM: efficient authenticated encryption from feebly one-way \(\varphi \) functions
- An observation on NORX, BLAKE2, and ChaCha
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- Generic security of the SAFE API and its applications
- The indifferentiability of the duplex and its practical applications
- Implicit key-stretching security of encryption schemes
- BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers
- Panther: a sponge based lightweight authenticated encryption scheme
- Revisiting the security of \textsf{COMET} authenticated encryption scheme
- New automatic search tool for searching for impossible differentials using undisturbed bits
- Preimage attacks on reduced-round \textsc{Ascon-Xof}
- Automated meet-in-the-middle attack goes to Feistel
- Exact security analysis of ASCON
- Applications of quasigroups in cryptography and coding theory
- Twin column parity mixers and Gaston. A new mixing layer and permutation
- Parallel verification of serial MAC and AE modes
- ZLR: a fast online authenticated encryption scheme achieving full security
- A sponge-based PRF with good multi-user security
- Farasha: a provable permutation-based parallelizable PRF
- Designing full-rate \textsf{Sponge} based AEAD modes
- On the security of triplex- and multiplex-type constructions with smaller tweaks
- Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more
- Generic attack on duplex-based AEAD modes using random function statistics
- Generalized Feistel ciphers for efficient prime field masking
- Improving generic attacks using exceptional functions
- Speeding up preimage and key-recovery attacks with highly biased differential-linear approximations
- Succinctly-committing authenticated encryption
- The committing security of MACs with applications to generic composition
- Optimizing Online Permutation-Based AE Schemes for Lightweight Applications
- Divide and rule: \textsf{DiFA} -- division property based fault attacks on \textsf{PRESENT} and \textsf{GIFT}
- TIDAL: practical collisions on state-reduced \textsc{Keccak} variants
- Reconsidering generic composition: the modes A10, A11 and A12 are insecure
- SpookChain: chaining a sponge-based AEAD with beyond-birthday security
Uses Software
This page was built for publication: Duplexing the sponge: Single-pass authenticated encryption and other applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2889879)