The Missing Difference problem, and its applications to counter mode encryption
From MaRDI portal
Publication:1648860
DOI10.1007/978-3-319-78375-8_24zbMath1428.94084OpenAlexW2794617439MaRDI QIDQ1648860
Ferdinand Sibleyras, Gaëtan Leurent
Publication date: 9 July 2018
Full work available at URL: https://hal.inria.fr/hal-01961739/file/ctrcryptbm.pdf
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Differential cryptanalysis of DES-like cryptosystems
- On weak keys and forgery attacks against polynomial-based MAC schemes
- Collision Attacks Against CAESAR Candidates
- New Generic Attacks against Hash-Based MACs
- Updates on Generic Attacks against HMAC and NMAC
- Improved Generic Attacks against Hash-Based MACs and HAIFA
- On the Security of Two MAC Algorithms
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
- The block cipher Square
- Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
- Generic Universal Forgery Attack on Iterative Hash-Based MACs
- Fast Software Encryption
- Progress in Cryptology - INDOCRYPT 2004
- Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant