On the related-key attack security of authenticated encryption schemes
From MaRDI portal
Publication:6134826
Recommendations
Cites work
- scientific article; zbMATH DE number 1583804 (Why is no real title available?)
- scientific article; zbMATH DE number 1024009 (Why is no real title available?)
- scientific article; zbMATH DE number 2009976 (Why is no real title available?)
- scientific article; zbMATH DE number 1394311 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A Provable-Security Treatment of the Key-Wrap Problem
- A single-key attack on the full GOST block cipher
- Analysis of RMAC.
- Clever arbiters versus malicious adversaries. On the gap between known-input security and chosen-input security
- Critique of the related-key attack concept
- Cryptography secure against related-key attacks and tampering
- Distinguisher and Related-Key Attack on the Full AES-256
- Efficient KDM-CCA secure public-key encryption for polynomial functions
- Fast Software Encryption
- KDM-CCA Security from RKA Secure Authenticated Encryption
- On cipher-dependent related-key attacks in the ideal-cipher model
- On the related-key attack security of authenticated encryption schemes
- Optimal computational split-state non-malleable codes
- Pseudorandom functions and permutations provably secure against related-key attacks
- Reconsidering generic composition
- Related-Key Boomerang and Rectangle Attacks
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Related-Key Rectangle Attack on the Full SHACAL-1
- Related-key attack on the full HIGHT
- Related-key security for pseudorandom functions beyond the linear barrier
- Secure message authentication against related-key attack
- Sponges resist leakage: the case of authenticated encryption
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- The related-key analysis of Feistel constructions
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
Cited in
(11)- Authenticated encryption with key identification
- On the related-key attack security of authenticated encryption schemes
- scientific article; zbMATH DE number 2202020 (Why is no real title available?)
- Public Key Encryption against Related Key Attacks
- Message extension attack against authenticated encryptions: application to PANDA
- The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE
- Authenticated and misuse-resistant encryption of key-dependent data
- On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
- Study on the security of the authentication scheme with key recycling in QKD
- The indifferentiability of the duplex and its practical applications
This page was built for publication: On the related-key attack security of authenticated encryption schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6134826)