Progress in Cryptology - INDOCRYPT 2004

From MaRDI portal
Publication:5712200

DOI10.1007/b104579zbMath1113.94315OpenAlexW2475752160WikidataQ27991510 ScholiaQ27991510MaRDI QIDQ5712200

David A. McGrew, John Viega

Publication date: 22 December 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b104579




Related Items (80)

Another Look at TightnessImproved Three-Way Split Formulas for Binary Polynomial MultiplicationVariants of Wegman-Carter message authentication code supporting variable tag lengthsOn the resilience of Even-Mansour to invariant permutationsAutomated proofs of block cipher modes of operationOn modes of operations of a block cipher for authentication and authenticated encryptionCryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor NetworksPartition oracles from weak key forgeriesIncremental cryptography revisited: PRFs, nonces and modular designPholkos -- efficient large-state tweakable block ciphers from the AES round functionOptimal forgeries against polynomial-based MACs and GCMRevisiting AES-GCM-SIV: multi-user security, faster key derivation, and better boundsThe Missing Difference problem, and its applications to counter mode encryptionWeak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemessp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained DevicesEfficient schemes for committing authenticated encryptionA new multi-linear universal hash familySecure GCM implementation on AVROn Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes\(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutationsAnother look at XCBIntegrity Analysis of Authenticated Encryption Based on Stream CiphersOn committing authenticated-encryptionAuthenticated Encryption Mode for Beyond the Birthday Bound SecurityTrick or Tweak: On the (In)security of OTR’s TweaksStatistical Fault Attacks on Nonce-Based Authenticated Encryption SchemesA modular approach to the incompressibility of block-cipher-based AEADsHow fast can SM4 be in software?Quantum linearization attacksToward a fully secure authenticated encryption scheme from a pseudorandom permutationCategorization of faulty nonce misuse resistant message authenticationOn weak keys and forgery attacks against polynomial-based MAC schemesQuantum attacks on beyond-birthday-bound MACsParaDiSE: efficient threshold authenticated encryption in fully malicious modelQuantum attacks on PRFs based on public random permutationsImplicit key-stretching security of encryption schemesUniversal hashing based on field multiplication and (near-)MDS matricesQuantum key distribution with PRF(Hash, Nonce) achieves everlasting securityAn Improved Security Bound for HCTRFault attacks on nonce-based authenticated encryption: application to Keyak and KetjeOn Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel AnalysisA session key caching and prefetching scheme for secure communication in cluster systemsON THE SECURITY OF AEAD-CRYPTOSYSTEM OF THE GCM TYPERelated-Key Almost Universal Hash Functions: Definitions, Constructions and ApplicationsEHE: NONCE MISUSE-RESISTANT MESSAGE AUTHENTICATIONAuthentication encryption based on authentication code with secrecyThe design and evolution of OCBThe Software Performance of Authenticated-Encryption Modes\textsc{POEx}: a beyond-birthday-bound-secure on-line cipherThe Multi-user Security of Double EncryptionCryptanalysis of \texttt{NORX} v2.0Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vectorKey-Recovery Attacks on Universal Hash Function Based MAC AlgorithmsThe power of primes: security of authentication based on a universal hash-function familyImplementing GCM on ARMv8Online Ciphers from Tweakable BlockciphersSecure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUICA New Mode of Operation for Incremental Authenticated Encryption with Associated DataThe \texttt{Deoxys} AEAD familyНовый режим аутентифицированного шифрования для произвольного блочного шифра на основе универсальной функции хэширования$\mathsf{XS}$-circuits in block ciphersThe Counter mode with encrypted nonces and its extension to authenticated encryption\textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fieldsLeakage resilient value comparison with application to message authenticationRevisiting construction of online cipher in hash-ECB-hash structureAuthenticated encryption: relations among notions and analysis of the generic composition paradigmPolyE+CTR: A Swiss-Army-Knife Mode for Block CiphersBreaking Symmetric Cryptosystems Using Quantum Period Finding\textsf{FAST}: disk encryption and beyondBeyond conventional security in sponge-based authenticated encryption modesCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersEWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MACThe Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3Commitment and authentication systemsThe memory-tightness of authenticated encryptionThe summation-truncation hybrid: reusing discarded bits for freeSingle-trace side-channel analysis on polynomial-based MAC schemesQuantum key distribution using universal hash functions over finite fieldsIQRA: Incremental Quadratic Re-keying friendly Authentication schemeAttacks on beyond-birthday-bound MACs in the quantum setting




This page was built for publication: Progress in Cryptology - INDOCRYPT 2004