On the related-key attack security of authenticated encryption schemes
From MaRDI portal
Publication:6134826
DOI10.1007/978-3-031-14791-3_16zbMATH Open1518.94061MaRDI QIDQ6134826FDOQ6134826
Authors: Sebastian Faust, Juliane Krämer, Maximilian Orlt, Patrick Struck
Publication date: 25 July 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Recommendations
Cites Work
- Cryptography secure against related-key attacks and tampering
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Title not available (Why is that?)
- Distinguisher and Related-Key Attack on the Full AES-256
- A Provable-Security Treatment of the Key-Wrap Problem
- Pseudorandom functions and permutations provably secure against related-key attacks
- On the related-key attack security of authenticated encryption schemes
- On cipher-dependent related-key attacks in the ideal-cipher model
- A single-key attack on the full GOST block cipher
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Related-Key Boomerang and Rectangle Attacks
- Critique of the related-key attack concept
- Secure message authentication against related-key attack
- Reconsidering generic composition
- The related-key analysis of Feistel constructions
- Efficient KDM-CCA secure public-key encryption for polynomial functions
- Fast Software Encryption
- Related-key security for pseudorandom functions beyond the linear barrier
- Optimal computational split-state non-malleable codes
- KDM-CCA Security from RKA Secure Authenticated Encryption
- Sponges resist leakage: the case of authenticated encryption
- Related-key attack on the full HIGHT
- Related-Key Rectangle Attack on the Full SHACAL-1
- Clever arbiters versus malicious adversaries. On the gap between known-input security and chosen-input security
- Analysis of RMAC.
Cited In (11)
- The indifferentiability of the duplex and its practical applications
- On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks
- The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE
- Authenticated encryption with key identification
- Title not available (Why is that?)
- Study on the security of the authentication scheme with key recycling in QKD
- Public Key Encryption against Related Key Attacks
- Authenticated and misuse-resistant encryption of key-dependent data
- On the related-key attack security of authenticated encryption schemes
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
- Message extension attack against authenticated encryptions: application to PANDA
This page was built for publication: On the related-key attack security of authenticated encryption schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6134826)