Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more
From MaRDI portal
Publication:6083136
DOI10.1007/978-3-031-30634-1_13zbMATH Open1528.94072MaRDI QIDQ6083136FDOQ6083136
Authors: Sanketh Menda, Julia Len, Paul Grubbs, Thomas Ristenpart
Publication date: 8 December 2023
Published in: Advances in Cryptology – EUROCRYPT 2023 (Search for Journal in Brave)
Recommendations
Cites Work
- Title not available (Why is that?)
- Robust Encryption
- Robust encryption, revisited
- Careful with composition: limitations of the indifferentiability framework
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Title not available (Why is that?)
- Title not available (Why is that?)
- How to protect DES against exhaustive key search (an analysis of DESX).
- Fast Software Encryption
- The software performance of authenticated-encryption modes
- A Provable-Security Treatment of the Key-Wrap Problem
- Efficient schemes for committing authenticated encryption
- Reconsidering generic composition
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- Format-preserving encryption
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- Fast message franking: from invisible salamanders to encryptment
- Message franking via committing authenticated encryption
- The full cost of cryptanalytic attacks
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
Cited In (4)
This page was built for publication: Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6083136)