Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption
From MaRDI portal
Publication:2975808
DOI10.1007/978-3-319-52153-4_15zbMath1383.94029OpenAlexW2569240628MaRDI QIDQ2975808
Publication date: 12 April 2017
Published in: Topics in Cryptology – CT-RSA 2017 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-52153-4_15
Related Items (6)
Tight security of cascaded LRW2 ⋮ Proof of mirror theory for a wide range of \(\xi_{\max }\) ⋮ On the Efficiency of ZMAC-Type Modes ⋮ Minimizing the two-round tweakable Even-Mansour cipher ⋮ Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption ⋮ \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- How to stretch random functions: The security of protected counter sums
- Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication
- On the Influence of Message Length in PMAC’s Security Bounds
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- PMAC with Parity: Minimizing the Query-Length Influence
- Robust Authenticated-Encryption AEZ and the Problem That It Solves
- Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption
- Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher
- New Bounds for PMAC, TMAC, and XCBC
- Improved security analysis of PMAC
- A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- A MAC Mode for Lightweight Block Ciphers
- McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
- A New Variant of PMAC: Beyond the Birthday Bound
- Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Fast Software Encryption
This page was built for publication: Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption