RIV for Robust Authenticated Encryption
From MaRDI portal
Publication:4639469
DOI10.1007/978-3-662-52993-5_2zbMath1387.94063OpenAlexW2500557448MaRDI QIDQ4639469
Jakob Wenzel, Farzaneh Abed, Stefan Lucks, Eik List, Christian Forler
Publication date: 9 May 2018
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-52993-5_2
Related Items
Rogue Decryption Failures: Reconciling AE Robustness Notions, Jammin' on the deck, Implicit key-stretching security of encryption schemes
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On modes of operations of a block cipher for authentication and authenticated encryption
- Efficient implementation of the Galois counter mode using a carry-less multiplier and a fast reduction algorithm
- The computational complexity of universal hashing
- On the construction of pseudorandom permutations: Luby-Rackoff revisited
- Universal hashing and authentication codes
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- A Modular Framework for Building Variable-Input-Length Tweakable Ciphers
- Constructive Cryptography – A New Paradigm for Security Definitions and Proofs
- How to Securely Release Unverified Plaintext in Authenticated Encryption
- On Symmetric Encryption with Distinguishable Decryption Failures
- Pipelineable On-line Encryption
- Misuse-Resistant Variants of the OMD Authenticated Encryption Mode
- Robust Authenticated-Encryption AEZ and the Problem That It Solves
- Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes
- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption
- A Domain Extender for the Ideal Cipher
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
- Rogue Decryption Failures: Reconciling AE Robustness Notions
- Robust Authenticated Encryption and the Limits of Symmetric Cryptography
- A Provable-Security Treatment of the Key-Wrap Problem
- Badger – A Fast and Provably Secure MAC
- BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Two practical and provably secure block ciphers: BEAR and LION
- Faster Luby-Rackoff ciphers
- McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
- Reconsidering Generic Composition
- Message Authentication on 64-Bit Architectures
- A New Algorithm for Inner Product
- Fast Software Encryption
- Fast Software Encryption
- Information Security and Cryptology
- Topics in Cryptology – CT-RSA 2004
- Theory of Cryptography