How to Securely Release Unverified Plaintext in Authenticated Encryption
From MaRDI portal
Publication:2938840
DOI10.1007/978-3-662-45611-8_6zbMath1306.94021OpenAlexW76791259MaRDI QIDQ2938840
Andrey Bogdanov, Elena Andreeva, Bart Mennink, Atul Luykx, Nicky Mouha, Kan Yasuda
Publication date: 16 January 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-45611-8_6
Related Items (27)
Hidden shift quantum cryptanalysis and implications ⋮ Rogue Decryption Failures: Reconciling AE Robustness Notions ⋮ Survey of information security ⋮ sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices ⋮ $\mathsf{sMGM}$: parameterizable AEAD mode ⋮ XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation ⋮ Integrity Analysis of Authenticated Encryption Based on Stream Ciphers ⋮ Authenticated Encryption with Variable Stretch ⋮ Jammin' on the deck ⋮ Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels ⋮ Post-quantum plaintext-awareness ⋮ ParaDiSE: efficient threshold authenticated encryption in fully malicious model ⋮ INT-RUP security of \textsf{SAEB} and \textsf{TinyJAMBU} ⋮ Hold your breath, PRIMATEs are lightweight ⋮ Weak Keys for AEZ, and the External Key Padding Attack ⋮ Simulatable channels: extended security that is universally composable and easier to prove ⋮ RIV for Robust Authenticated Encryption ⋮ \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher ⋮ Cryptanalysis of \texttt{NORX} v2.0 ⋮ Breaking LWC candidates: sESTATE and Elephant in quantum setting ⋮ The Oribatida v1.3 family of lightweight authenticated encryption schemes ⋮ Forgery and Subkey Recovery on CAESAR Candidate iFeed ⋮ A New Mode of Operation for Incremental Authenticated Encryption with Associated Data ⋮ Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts ⋮ The \texttt{Deoxys} AEAD family ⋮ Cryptanalysis of OCB2: attacks on authenticity and confidentiality ⋮ Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
Uses Software
This page was built for publication: How to Securely Release Unverified Plaintext in Authenticated Encryption