Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
From MaRDI portal
Publication:2889879
DOI10.1007/978-3-642-28496-0_19zbMath1292.94030MaRDI QIDQ2889879
Michaël Peeters, Guido Bertoni, Joan Daemen, Gilles Van Assche
Publication date: 8 June 2012
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-28496-0_19
provable security; authenticated encryption; Keccak; duplex construction; key wrapping; pseudo-random bit sequence generator; sponge functions
94A60: Cryptography
Related Items
New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length, Cryptanalysis of Reduced NORX, Practical forgeries for ORANGE, Open problems in hash function security, Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method, Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes, Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje, sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives, Signcryption schemes with insider security in an ideal permutation model, Cryptanalysis of \texttt{NORX} v2.0, Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode, An observation on NORX, BLAKE2, and ChaCha, Troika: a ternary cryptographic hash function, Beyond conventional security in sponge-based authenticated encryption modes, Quark: a lightweight hash, MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes, How to Incorporate Associated Data in Sponge-Based Authenticated Encryption, A New Mode of Operation for Incremental Authenticated Encryption with Associated Data, Forgery Attacks on Round-Reduced ICEPOLE-128, XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees, Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications, ASC-1: An Authenticated Encryption Stream Cipher, Analysis of NORX: Investigating Differential and Rotational Properties, Cryptographic Applications of the Duplex Construction, Weak Keys for AEZ, and the External Key Padding Attack, Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message, sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices, Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26--28, 2007. Revised selected papers
- Cryptographic hardware and embedded systems -- CHES 2010. 12th international workshop, Santa Barbara, USA, August 17--20, 2010. Proceedings
- Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5--7, 2004. Revised papers.
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Careful with Composition: Limitations of the Indifferentiability Framework
- The Grindahl Hash Functions
- Differential-Linear Attacks Against the Stream Cipher Phelix
- Quark: A Lightweight Hash
- Sponge-Based Pseudo-Random Number Generators
- A Provable-Security Treatment of the Key-Wrap Problem
- Slide Attacks on a Class of Hash Functions
- Keccak
- The PHOTON Family of Lightweight Hash Functions
- On the Indifferentiability of the Sponge Construction
- Information Security and Privacy
- Fast Software Encryption
- Theory of Cryptography
- Fast Software Encryption