Rogue Decryption Failures: Reconciling AE Robustness Notions
From MaRDI portal
Publication:3460100
DOI10.1007/978-3-319-27239-9_6zbMATH Open1376.94026OpenAlexW2406107187MaRDI QIDQ3460100FDOQ3460100
Authors: Guy Barwell, Daniel R. Page, Martijn Stam
Publication date: 12 January 2016
Published in: Cryptography and Coding (Search for Journal in Brave)
Full work available at URL: https://research-information.bris.ac.uk/en/publications/ef59491c-5f71-4f41-9565-6e6c75b9348a
Recommendations
- Robust encryption, revisited
- A fundamental flaw in the ++AE authenticated encryption mode
- Robust authenticated encryption and the limits of symmetric cryptography
- On symmetric encryption with distinguishable decryption failures
- Robust authenticated-encryption AEZ and the problem that it solves
- Failing gracefully: decryption failures and the Fujisaki-Okamoto transform
- Computer Aided Verification
- Preventing fault attacks using fault randomisation with a case study on AES
- Destroying fault invariant with randomization. A countermeasure for AES against differential fault attacks
Cites Work
- A Provable-Security Treatment of the Key-Wrap Problem
- Title not available (Why is that?)
- How to securely release unverified plaintext in authenticated encryption
- Reconsidering generic composition
- Robust authenticated-encryption AEZ and the problem that it solves
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
- Fast Software Encryption
- Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks
- On symmetric encryption with distinguishable decryption failures
- Rogue Decryption Failures: Reconciling AE Robustness Notions
- Cryptography and Coding
- Title not available (Why is that?)
- KDM security in the hybrid framework
- RIV for robust authenticated encryption
Cited In (12)
- Authenticated encryption with nonce misuse and physical leakage: definitions, separation results and first construction (extended abstract)
- Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels
- Hidden shift quantum cryptanalysis and implications
- Weak keys for AEZ, and the external key padding attack
- On symmetric encryption with distinguishable decryption failures
- Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
- Failing gracefully: decryption failures and the Fujisaki-Okamoto transform
- Rogue Decryption Failures: Reconciling AE Robustness Notions
- RIV for robust authenticated encryption
- Simulatable channels: extended security that is universally composable and easier to prove
- Simplifying game-based definitions -- indistinguishability up to correctness and its application to stateful AE
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
This page was built for publication: Rogue Decryption Failures: Reconciling AE Robustness Notions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3460100)