KIVR: committing authenticated encryption using redundancy and application to GCM, CCM, and more
From MaRDI portal
Publication:6547985
DOI10.1007/978-3-031-54770-6_13MaRDI QIDQ6547985FDOQ6547985
Authors: Yusuke Naito, Yu Sasaki, Takeshi Sugawara
Publication date: 31 May 2024
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Title not available (Why is that?)
- One Way Hash Functions and DES
- Blockcipher-Based Hashing Revisited
- The preimage security of double-block-length compression functions
- How to securely release unverified plaintext in authenticated encryption
- Efficient schemes for committing authenticated encryption
- On committing authenticated-encryption
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds
- Fast message franking: from invisible salamanders to encryptment
- Indifferentiable authenticated encryption
- Message franking via committing authenticated encryption
- Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more
Cited In (2)
This page was built for publication: KIVR: committing authenticated encryption using redundancy and application to GCM, CCM, and more
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6547985)