Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC

From MaRDI portal
Publication:5465817


DOI10.1007/978-3-540-30539-2_2zbMath1094.94035OpenAlexW2155115217MaRDI QIDQ5465817

Phillip Rogaway

Publication date: 12 August 2005

Published in: Advances in Cryptology - ASIACRYPT 2004 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-30539-2_2



Related Items

Another Look at Tightness, PMAC with Parity: Minimizing the Query-Length Influence, Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE, Towards tight security of cascaded LRW2, On modes of operations of a block cipher for authentication and authenticated encryption, Tweaking Even-Mansour Ciphers, Tweak-Length Extension for Tweakable Blockciphers, Incremental cryptography revisited: PRFs, nonces and modular design, Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes, Generalizing PMAC Under Weaker Assumptions, Secure storage -- confidentiality and authentication, Connecting tweakable and multi-key blockcipher security, Tweakable Blockciphers with Asymptotically Optimal Security, Authenticated encryption for very short inputs, QCB is blindly unforgeable, XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation, Blockcipher-based authenticated encryption: how small can we go?, Tight security of cascaded LRW2, A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality, Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks, Non-adaptive Group-Testing Aggregate MAC Scheme, Trick or Tweak: On the (In)security of OTR’s Tweaks, Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes, Authenticated Encryption with Variable Stretch, How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers, Jammin' on the deck, Quantum linearization attacks, QCB: efficient quantum-secure authenticated encryption, \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher, On the Efficiency of ZMAC-Type Modes, INT-RUP security of \textsf{SAEB} and \textsf{TinyJAMBU}, Offset-based BBB-secure tweakable block-ciphers with updatable caches, Implicit key-stretching security of encryption schemes, Tweakable enciphering schemes using only the encryption function of a block cipher, Output masking of tweakable Even-Mansour can be eliminated for message authentication code, Post-quantum verification of Fujisaki-Okamoto, Minimizing the two-round tweakable Even-Mansour cipher, Beyond birthday bound secure fresh rekeying: application to authenticated encryption, Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher, Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data, A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier, Weak Keys for AEZ, and the External Key Padding Attack, Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption, Tweakable block ciphers, Tweaking key-alternating Feistel block ciphers, Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications, The design and evolution of OCB, The Software Performance of Authenticated-Encryption Modes, \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher, On the optimality of non-linear computations for symmetric key primitives, Building blockcipher from small-block tweakable blockcipher, A general mixing strategy for the ECB-Mix-ECB mode of operation, Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector, Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication, Tweakable Enciphering Schemes from Hash-Sum-Expansion, Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model, A New Mode of Operation for Incremental Authenticated Encryption with Associated Data, Analysis of the CAESAR Candidate Silver, The \texttt{Deoxys} AEAD family, Cryptanalysis of OCB2: attacks on authenticity and confidentiality, Новый режим аутентифицированного шифрования для произвольного блочного шифра на основе универсальной функции хэширования, Authenticated Encryption with Small Stretch (or, How to Accelerate AERO), Revisiting construction of online cipher in hash-ECB-hash structure, PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers, Breaking Symmetric Cryptosystems Using Quantum Period Finding, Linicrypt: A Model for Practical Cryptography, \textsf{FAST}: disk encryption and beyond, Beyond conventional security in sponge-based authenticated encryption modes, Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal, Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers, XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees, The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3, The \(\mathsf{mF}\) mode of authenticated encryption with associated data, Hash Functions and RFID Tags: Mind the Gap, Tweakable Pseudorandom Permutation from Generalized Feistel Structure, Analyzing the provable security bounds of GIFT-COFB and Photon-Beetle, TNT: how to tweak a block cipher