Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes
From MaRDI portal
Publication:2938839
DOI10.1007/978-3-662-45611-8_5zbMath1306.94065OpenAlexW2131384593MaRDI QIDQ2938839
Philipp Jovanovic, Bart Mennink, Atul Luykx
Publication date: 16 January 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-45611-8_5
Related Items (12)
Generic attack on duplex-based AEAD modes using random function statistics ⋮ Cryptographic Applications of the Duplex Construction ⋮ Sponge-based authenticated encryption: security against quantum attackers ⋮ Weak Keys for AEZ, and the External Key Padding Attack ⋮ New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length ⋮ Quantum algorithm for the multicollision problem ⋮ Cryptanalysis of \texttt{NORX} v2.0 ⋮ How to Incorporate Associated Data in Sponge-Based Authenticated Encryption ⋮ Cryptanalysis of Ascon ⋮ The Oribatida v1.3 family of lightweight authenticated encryption schemes ⋮ \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing ⋮ Beyond conventional security in sponge-based authenticated encryption modes
This page was built for publication: Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes