Reconsidering Generic Composition

From MaRDI portal
Publication:5418700


DOI10.1007/978-3-642-55220-5_15zbMath1332.94092MaRDI QIDQ5418700

Chanathip Namprempre, Phillip Rogaway, Thomas Shrimpton

Publication date: 27 May 2014

Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_15


94A60: Cryptography

68P25: Data encryption (aspects in computer science)

94A62: Authentication, digital signatures and secret sharing


Related Items

RIV for Robust Authenticated Encryption, Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more, Secret can be public: low-memory AEAD mode for high-order masking, On committing authenticated-encryption, A modular approach to the incompressibility of block-cipher-based AEADs, On the related-key attack security of authenticated encryption schemes, \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher, Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels, Sponge-based authenticated encryption: security against quantum attackers, Implicit key-stretching security of encryption schemes, A symmetric cryptographic scheme for data integrity verification in cloud databases, Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds, The design and evolution of OCB, The \texttt{Deoxys} AEAD family, \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption, Hiding in plain sight: memory-tight proofs via randomness programming, Efficient schemes for committing authenticated encryption, Secure storage -- confidentiality and authentication, ACE in chains: how risky is CBC encryption of binary executable files?, Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers, The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3, Integrity Analysis of Authenticated Encryption Based on Stream Ciphers, Authenticated Encryption with Variable Stretch, Rogue Decryption Failures: Reconciling AE Robustness Notions