BBB secure nonce based MAC using public permutations
From MaRDI portal
Publication:5048969
DOI10.1007/978-3-030-51938-4_9zbMATH Open1504.94136OpenAlexW3030960085MaRDI QIDQ5048969FDOQ5048969
Authors: Avijit Dutta, Mridul Nandi
Publication date: 9 November 2022
Published in: Progress in Cryptology - AFRICACRYPT 2020 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-51938-4_9
Recommendations
- Multi-user BBB security of public permutations based MAC
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations
- Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption
- Categorization of faulty nonce misuse resistant message authentication
- \(\mathsf{DWCDM}_+\): a BBB secure nonce based MAC
Cites Work
- Keccak
- New hash functions and their use in authentication and set equality
- A construction of a cipher from a single pseudorandom permutation.
- Minimizing the two-round Even-Mansour cipher
- Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)
- SPONGENT: The Design Space of Lightweight Cryptographic Hashing
- The PHOTON family of lightweight hash functions
- The Multi-user Security of Double Encryption
- Key-alternating ciphers and key-length extension: exact bounds and multi-user security
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
- Encrypt or decrypt -- to make a single-key beyond birthday secure nonce-based MAC
- How to build pseudorandom functions from public random permutations
- Parallelizable MACs based on the sum of PRPs with security beyond the birthday bound
- Beyond birthday bound secure MAC in faulty nonce model
- How to Thwart Birthday Attacks against MACs via Small Randomness
Cited In (7)
- Quantum attacks against BBB secure PRFs or MACs built from public random permutations
- Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption
- Tight security analysis of the public permutation-based \(\mathsf{PMAC\_Plus} \)
- A modular approach to the security analysis of two-permutation constructions
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations
- \(\mathsf{DWCDM}_+\): a BBB secure nonce based MAC
- Multi-user BBB security of public permutations based MAC
Uses Software
This page was built for publication: BBB secure nonce based MAC using public permutations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5048969)