A modular approach to the incompressibility of block-cipher-based AEADs
From MaRDI portal
Publication:6132427
Recommendations
- Efficient and Provable White-Box Primitives
- WEM: a new family of white-box block ciphers based on the Even-Mansour construction
- Doubly half-injective PRGs for incompressible white-box cryptography
- White-box security notions for symmetric encryption schemes
- Towards practical whitebox cryptography: optimizing efficiency and space hardness
Cites work
- scientific article; zbMATH DE number 1951616 (Why is no real title available?)
- A Leakage-Resilient Mode of Operation
- A Provable-Security Treatment of the Key-Wrap Problem
- A modular approach to the incompressibility of block-cipher-based AEADs
- A white-box DES implementation for DRM applications
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - CRYPTO 2003
- Attacks and countermeasures for white-box designs
- Authenticated encryption in the face of protocol and side channel leakage
- Big-key symmetric encryption: resisting key exfiltration
- Careful with composition: limitations of the indifferentiability framework
- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
- Cryptanalysis of the Xiao-Lai white-box AES implementation
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- Differential computation analysis: hiding your white-box designs is not enough
- Doubly half-injective PRGs for incompressible white-box cryptography
- Dummy shuffling against algebraic attacks in white-box implementations
- Efficient and Provable White-Box Primitives
- Indifferentiable authenticated encryption
- Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
- Leakage resilience of the duplex construction
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
- Leakage-resilient symmetric cryptography under empirically verifiable assumptions
- Leaky Random Oracle (Extended Abstract)
- On the Indifferentiability of the Sponge Construction
- On the public indifferentiability and correlation intractability of the 6-round Feistel construction
- Progress in Cryptology - INDOCRYPT 2004
- Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali
- Public-key encryption in the bounded-retrieval model
- Reconsidering generic composition
- Robust authenticated-encryption AEZ and the problem that it solves
- Salvaging Merkle-Damgård for Practical Applications
- Security reductions for white-box key-storage in mobile payments
- Selected Areas in Cryptography
- Simulatable leakage: analysis, pitfalls, and new constructions
- Sponges resist leakage: the case of authenticated encryption
- Symmetrically and asymmetrically hard cryptography
- The software performance of authenticated-encryption modes
- Theory of Cryptography
- Theory of Cryptography
- Theory of Cryptography
- Theory of Cryptography
- Towards practical whitebox cryptography: optimizing efficiency and space hardness
- Two attacks on a white-box AES implementation
- White-box security notions for symmetric encryption schemes
Cited in
(2)
This page was built for publication: A modular approach to the incompressibility of block-cipher-based AEADs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6132427)