A modular approach to the incompressibility of block-cipher-based AEADs
From MaRDI portal
Publication:6132427
DOI10.1007/978-3-031-22966-4_20zbMATH Open1519.94133OpenAlexW4320155108MaRDI QIDQ6132427FDOQ6132427
Authors: Akinori Hosoyamada, Takanori Isobe, Yosuke Todo, Kan Yasuda
Publication date: 16 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22966-4_20
Recommendations
- Efficient and Provable White-Box Primitives
- WEM: a new family of white-box block ciphers based on the Even-Mansour construction
- Doubly half-injective PRGs for incompressible white-box cryptography
- White-box security notions for symmetric encryption schemes
- Towards practical whitebox cryptography: optimizing efficiency and space hardness
incompressibilitymode of operationsymmetric-key cryptographywhite-box cryptographypublic indifferentiability
Cites Work
- On the public indifferentiability and correlation intractability of the 6-round Feistel construction
- Careful with composition: limitations of the indifferentiability framework
- On the Indifferentiability of the Sponge Construction
- Theory of Cryptography
- Advances in Cryptology - CRYPTO 2003
- Progress in Cryptology - INDOCRYPT 2004
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- A Leakage-Resilient Mode of Operation
- Theory of Cryptography
- The software performance of authenticated-encryption modes
- A Provable-Security Treatment of the Key-Wrap Problem
- Salvaging Merkle-Damgård for Practical Applications
- Leaky Random Oracle (Extended Abstract)
- Leakage-resilient symmetric cryptography under empirically verifiable assumptions
- Public-key encryption in the bounded-retrieval model
- Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
- Advances in Cryptology - CRYPTO 2003
- Theory of Cryptography
- Theory of Cryptography
- Authenticated encryption in the face of protocol and side channel leakage
- Symmetrically and asymmetrically hard cryptography
- Simulatable leakage: analysis, pitfalls, and new constructions
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
- Reconsidering generic composition
- Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali
- Differential computation analysis: hiding your white-box designs is not enough
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- Robust authenticated-encryption AEZ and the problem that it solves
- Two attacks on a white-box AES implementation
- A white-box DES implementation for DRM applications
- Cryptanalysis of the Xiao-Lai white-box AES implementation
- Title not available (Why is that?)
- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
- Selected Areas in Cryptography
- Big-key symmetric encryption: resisting key exfiltration
- Indifferentiable authenticated encryption
- Attacks and countermeasures for white-box designs
- White-box security notions for symmetric encryption schemes
- Efficient and Provable White-Box Primitives
- Dummy shuffling against algebraic attacks in white-box implementations
- Leakage resilience of the duplex construction
- Sponges resist leakage: the case of authenticated encryption
- Towards practical whitebox cryptography: optimizing efficiency and space hardness
- Security reductions for white-box key-storage in mobile payments
- Doubly half-injective PRGs for incompressible white-box cryptography
- A modular approach to the incompressibility of block-cipher-based AEADs
Cited In (2)
This page was built for publication: A modular approach to the incompressibility of block-cipher-based AEADs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6132427)