Encrypt or decrypt -- to make a single-key beyond birthday secure nonce-based MAC
From MaRDI portal
Publication:1673414
DOI10.1007/978-3-319-96884-1_21zbMath1444.94059OpenAlexW2809690130MaRDI QIDQ1673414
Kan Yasuda, Avijit Dutta, Mridul Nandi, Nilanjan Datta
Publication date: 12 September 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-96884-1_21
Related Items (16)
Extending AES improvements: A proposal for Alpha-MAC in view of collision resistance ⋮ BBB Secure Nonce Based MAC Using Public Permutations ⋮ Beyond-birthday security for permutation-based Feistel networks ⋮ \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations ⋮ XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation ⋮ Tight security of cascaded LRW2 ⋮ Proof of mirror theory for a wide range of \(\xi_{\max }\) ⋮ A modular approach to the security analysis of two-permutation constructions ⋮ Toward a fully secure authenticated encryption scheme from a pseudorandom permutation ⋮ Categorization of faulty nonce misuse resistant message authentication ⋮ Provably secure reflection ciphers ⋮ Designing tweakable enciphering schemes using public permutations ⋮ Improved security analysis for nonce-based enhanced hash-then-mask MACs ⋮ How to build optimally secure PRFs using block ciphers ⋮ Mind the composition: birthday bound attacks on EWCDMD and SoKAC21 ⋮ Multi-user BBB security of public permutations based MAC
This page was built for publication: Encrypt or decrypt -- to make a single-key beyond birthday secure nonce-based MAC