Robust Authenticated-Encryption AEZ and the Problem That It Solves
From MaRDI portal
Publication:2948322
DOI10.1007/978-3-662-46800-5_2zbMath1365.94485OpenAlexW617944061MaRDI QIDQ2948322
Ted Krovetz, Viet Tung Hoang, Phillip Rogaway
Publication date: 30 September 2015
Published in: Advances in Cryptology -- EUROCRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46800-5_2
authenticated encryptionCAESAR competitionmodes of operationAEZmisuse resistancenonce reuseprove-then-prunerobust AE
Related Items
On the resilience of Even-Mansour to invariant permutations ⋮ Nonce-misuse security of the SAEF authenticated encryption mode ⋮ Towards tight security of cascaded LRW2 ⋮ Hidden shift quantum cryptanalysis and implications ⋮ Optimizing Online Permutation-Based AE Schemes for Lightweight Applications ⋮ AEZ: Anything-But EaZy in Hardware ⋮ Rogue Decryption Failures: Reconciling AE Robustness Notions ⋮ Robust Authenticated Encryption and the Limits of Symmetric Cryptography ⋮ Survey of information security ⋮ Certified compilation for cryptography: extended x86 instructions and constant-time verification ⋮ $\mathsf{sMGM}$: parameterizable AEAD mode ⋮ Tight security of cascaded LRW2 ⋮ Simpira v2: A Family of Efficient Permutations Using the AES Round Function ⋮ Trick or Tweak: On the (In)security of OTR’s Tweaks ⋮ Authenticated Encryption with Variable Stretch ⋮ Jammin' on the deck ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ Toward a fully secure authenticated encryption scheme from a pseudorandom permutation ⋮ Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels ⋮ Designing tweakable enciphering schemes using public permutations ⋮ ParaDiSE: efficient threshold authenticated encryption in fully malicious model ⋮ Implicit key-stretching security of encryption schemes ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher ⋮ Weak Keys for AEZ, and the External Key Padding Attack ⋮ Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption ⋮ Simulatable channels: extended security that is universally composable and easier to prove ⋮ RIV for Robust Authenticated Encryption ⋮ Quantum key-recovery on full AEZ ⋮ Deterministic encryption with the Thorp shuffle ⋮ Improved key recovery attacks on reduced-round AES with practical data and memory complexities ⋮ The Oribatida v1.3 family of lightweight authenticated encryption schemes ⋮ The \texttt{Deoxys} AEAD family ⋮ Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch ⋮ Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) ⋮ Breaking Symmetric Cryptosystems Using Quantum Period Finding ⋮ \textsf{FAST}: disk encryption and beyond ⋮ Beyond conventional security in sponge-based authenticated encryption modes ⋮ Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers ⋮ TNT: how to tweak a block cipher