Robust Authenticated-Encryption AEZ and the Problem That It Solves

From MaRDI portal
Publication:2948322

DOI10.1007/978-3-662-46800-5_2zbMath1365.94485OpenAlexW617944061MaRDI QIDQ2948322

Ted Krovetz, Viet Tung Hoang, Phillip Rogaway

Publication date: 30 September 2015

Published in: Advances in Cryptology -- EUROCRYPT 2015 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-46800-5_2




Related Items

On the resilience of Even-Mansour to invariant permutationsNonce-misuse security of the SAEF authenticated encryption modeTowards tight security of cascaded LRW2Hidden shift quantum cryptanalysis and implicationsOptimizing Online Permutation-Based AE Schemes for Lightweight ApplicationsAEZ: Anything-But EaZy in HardwareRogue Decryption Failures: Reconciling AE Robustness NotionsRobust Authenticated Encryption and the Limits of Symmetric CryptographySurvey of information securityCertified compilation for cryptography: extended x86 instructions and constant-time verification$\mathsf{sMGM}$: parameterizable AEAD modeTight security of cascaded LRW2Simpira v2: A Family of Efficient Permutations Using the AES Round FunctionTrick or Tweak: On the (In)security of OTR’s TweaksAuthenticated Encryption with Variable StretchJammin' on the deckA modular approach to the incompressibility of block-cipher-based AEADsToward a fully secure authenticated encryption scheme from a pseudorandom permutationOverloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channelsDesigning tweakable enciphering schemes using public permutationsParaDiSE: efficient threshold authenticated encryption in fully malicious modelImplicit key-stretching security of encryption schemesBeyond birthday bound secure fresh rekeying: application to authenticated encryptionJust tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipherWeak Keys for AEZ, and the External Key Padding AttackRevisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated EncryptionSimulatable channels: extended security that is universally composable and easier to proveRIV for Robust Authenticated EncryptionQuantum key-recovery on full AEZDeterministic encryption with the Thorp shuffleImproved key recovery attacks on reduced-round AES with practical data and memory complexitiesThe Oribatida v1.3 family of lightweight authenticated encryption schemesThe \texttt{Deoxys} AEAD familyEfficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal StretchAuthenticated Encryption with Small Stretch (or, How to Accelerate AERO)Breaking Symmetric Cryptosystems Using Quantum Period Finding\textsf{FAST}: disk encryption and beyondBeyond conventional security in sponge-based authenticated encryption modesCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersTNT: how to tweak a block cipher