Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more
From MaRDI portal
Publication:6083136
Recommendations
Cites work
- scientific article; zbMATH DE number 1583788 (Why is no real title available?)
- scientific article; zbMATH DE number 1942427 (Why is no real title available?)
- scientific article; zbMATH DE number 1942429 (Why is no real title available?)
- A Provable-Security Treatment of the Key-Wrap Problem
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- Careful with composition: limitations of the indifferentiability framework
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- Efficient schemes for committing authenticated encryption
- Fast Software Encryption
- Fast message franking: from invisible salamanders to encryptment
- Format-preserving encryption
- How to protect DES against exhaustive key search (an analysis of DESX).
- Message franking via committing authenticated encryption
- Reconsidering generic composition
- Robust Encryption
- Robust encryption, revisited
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- The full cost of cryptanalytic attacks
- The software performance of authenticated-encryption modes
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
Cited in
(4)
This page was built for publication: Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6083136)