Progress in Cryptology - INDOCRYPT 2004
From MaRDI portal
Publication:5712200
DOI10.1007/b104579zbMath1113.94315OpenAlexW2475752160WikidataQ27991510 ScholiaQ27991510MaRDI QIDQ5712200
Publication date: 22 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b104579
Related Items (80)
Another Look at Tightness ⋮ Improved Three-Way Split Formulas for Binary Polynomial Multiplication ⋮ Variants of Wegman-Carter message authentication code supporting variable tag lengths ⋮ On the resilience of Even-Mansour to invariant permutations ⋮ Automated proofs of block cipher modes of operation ⋮ On modes of operations of a block cipher for authentication and authenticated encryption ⋮ Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks ⋮ Partition oracles from weak key forgeries ⋮ Incremental cryptography revisited: PRFs, nonces and modular design ⋮ Pholkos -- efficient large-state tweakable block ciphers from the AES round function ⋮ Optimal forgeries against polynomial-based MACs and GCM ⋮ Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds ⋮ The Missing Difference problem, and its applications to counter mode encryption ⋮ Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes ⋮ sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices ⋮ Efficient schemes for committing authenticated encryption ⋮ A new multi-linear universal hash family ⋮ Secure GCM implementation on AVR ⋮ On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes ⋮ \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations ⋮ Another look at XCB ⋮ Integrity Analysis of Authenticated Encryption Based on Stream Ciphers ⋮ On committing authenticated-encryption ⋮ Authenticated Encryption Mode for Beyond the Birthday Bound Security ⋮ Trick or Tweak: On the (In)security of OTR’s Tweaks ⋮ Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ How fast can SM4 be in software? ⋮ Quantum linearization attacks ⋮ Toward a fully secure authenticated encryption scheme from a pseudorandom permutation ⋮ Categorization of faulty nonce misuse resistant message authentication ⋮ On weak keys and forgery attacks against polynomial-based MAC schemes ⋮ Quantum attacks on beyond-birthday-bound MACs ⋮ ParaDiSE: efficient threshold authenticated encryption in fully malicious model ⋮ Quantum attacks on PRFs based on public random permutations ⋮ Implicit key-stretching security of encryption schemes ⋮ Universal hashing based on field multiplication and (near-)MDS matrices ⋮ Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security ⋮ An Improved Security Bound for HCTR ⋮ Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje ⋮ On Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel Analysis ⋮ A session key caching and prefetching scheme for secure communication in cluster systems ⋮ ON THE SECURITY OF AEAD-CRYPTOSYSTEM OF THE GCM TYPE ⋮ Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications ⋮ EHE: NONCE MISUSE-RESISTANT MESSAGE AUTHENTICATION ⋮ Authentication encryption based on authentication code with secrecy ⋮ The design and evolution of OCB ⋮ The Software Performance of Authenticated-Encryption Modes ⋮ \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher ⋮ The Multi-user Security of Double Encryption ⋮ Cryptanalysis of \texttt{NORX} v2.0 ⋮ Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector ⋮ Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms ⋮ The power of primes: security of authentication based on a universal hash-function family ⋮ Implementing GCM on ARMv8 ⋮ Online Ciphers from Tweakable Blockciphers ⋮ Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC ⋮ A New Mode of Operation for Incremental Authenticated Encryption with Associated Data ⋮ The \texttt{Deoxys} AEAD family ⋮ Новый режим аутентифицированного шифрования для произвольного блочного шифра на основе универсальной функции хэширования ⋮ $\mathsf{XS}$-circuits in block ciphers ⋮ The Counter mode with encrypted nonces and its extension to authenticated encryption ⋮ \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields ⋮ Leakage resilient value comparison with application to message authentication ⋮ Revisiting construction of online cipher in hash-ECB-hash structure ⋮ Authenticated encryption: relations among notions and analysis of the generic composition paradigm ⋮ PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers ⋮ Breaking Symmetric Cryptosystems Using Quantum Period Finding ⋮ \textsf{FAST}: disk encryption and beyond ⋮ Beyond conventional security in sponge-based authenticated encryption modes ⋮ Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers ⋮ EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC ⋮ The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3 ⋮ Commitment and authentication systems ⋮ The memory-tightness of authenticated encryption ⋮ The summation-truncation hybrid: reusing discarded bits for free ⋮ Single-trace side-channel analysis on polynomial-based MAC schemes ⋮ Quantum key distribution using universal hash functions over finite fields ⋮ IQRA: Incremental Quadratic Re-keying friendly Authentication scheme ⋮ Attacks on beyond-birthday-bound MACs in the quantum setting
This page was built for publication: Progress in Cryptology - INDOCRYPT 2004