How to Securely Release Unverified Plaintext in Authenticated Encryption

From MaRDI portal
Publication:2938840


DOI10.1007/978-3-662-45611-8_6zbMath1306.94021OpenAlexW76791259MaRDI QIDQ2938840

Andrey Bogdanov, Elena Andreeva, Bart Mennink, Atul Luykx, Nicky Mouha, Kan Yasuda

Publication date: 16 January 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-45611-8_6



Related Items

Hidden shift quantum cryptanalysis and implications, Rogue Decryption Failures: Reconciling AE Robustness Notions, Survey of information security, sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices, $\mathsf{sMGM}$: parameterizable AEAD mode, XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation, Integrity Analysis of Authenticated Encryption Based on Stream Ciphers, Authenticated Encryption with Variable Stretch, Jammin' on the deck, Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels, Post-quantum plaintext-awareness, ParaDiSE: efficient threshold authenticated encryption in fully malicious model, INT-RUP security of \textsf{SAEB} and \textsf{TinyJAMBU}, Hold your breath, PRIMATEs are lightweight, Weak Keys for AEZ, and the External Key Padding Attack, Simulatable channels: extended security that is universally composable and easier to prove, RIV for Robust Authenticated Encryption, \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher, Cryptanalysis of \texttt{NORX} v2.0, Breaking LWC candidates: sESTATE and Elephant in quantum setting, The Oribatida v1.3 family of lightweight authenticated encryption schemes, Forgery and Subkey Recovery on CAESAR Candidate iFeed, A New Mode of Operation for Incremental Authenticated Encryption with Associated Data, Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts, The \texttt{Deoxys} AEAD family, Cryptanalysis of OCB2: attacks on authenticity and confidentiality, Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers


Uses Software