How to Securely Release Unverified Plaintext in Authenticated Encryption

From MaRDI portal
Publication:2938840

DOI10.1007/978-3-662-45611-8_6zbMath1306.94021OpenAlexW76791259MaRDI QIDQ2938840

Andrey Bogdanov, Elena Andreeva, Bart Mennink, Atul Luykx, Nicky Mouha, Kan Yasuda

Publication date: 16 January 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-45611-8_6




Related Items (27)

Hidden shift quantum cryptanalysis and implicationsRogue Decryption Failures: Reconciling AE Robustness NotionsSurvey of information securitysp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices$\mathsf{sMGM}$: parameterizable AEAD modeXOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computationIntegrity Analysis of Authenticated Encryption Based on Stream CiphersAuthenticated Encryption with Variable StretchJammin' on the deckOverloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channelsPost-quantum plaintext-awarenessParaDiSE: efficient threshold authenticated encryption in fully malicious modelINT-RUP security of \textsf{SAEB} and \textsf{TinyJAMBU}Hold your breath, PRIMATEs are lightweightWeak Keys for AEZ, and the External Key Padding AttackSimulatable channels: extended security that is universally composable and easier to proveRIV for Robust Authenticated Encryption\textsc{POEx}: a beyond-birthday-bound-secure on-line cipherCryptanalysis of \texttt{NORX} v2.0Breaking LWC candidates: sESTATE and Elephant in quantum settingThe Oribatida v1.3 family of lightweight authenticated encryption schemesForgery and Subkey Recovery on CAESAR Candidate iFeedA New Mode of Operation for Incremental Authenticated Encryption with Associated DataScope: On the Side Channel Vulnerability of Releasing Unverified PlaintextsThe \texttt{Deoxys} AEAD familyCryptanalysis of OCB2: attacks on authenticity and confidentialityCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers


Uses Software



This page was built for publication: How to Securely Release Unverified Plaintext in Authenticated Encryption