Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
From MaRDI portal
Publication:3457125
DOI10.1007/978-3-662-47989-6_24zbMath1375.94167OpenAlexW1897681009MaRDI QIDQ3457125
Reza Reyhanitabar, Damian Vizár, Viet Tung Hoang, Phillip Rogaway
Publication date: 10 December 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-47989-6_24
Related Items (13)
Nonce-misuse security of the SAEF authenticated encryption mode ⋮ Hidden shift quantum cryptanalysis and implications ⋮ Rogue Decryption Failures: Reconciling AE Robustness Notions ⋮ The Missing Difference problem, and its applications to counter mode encryption ⋮ Authenticated Encryption with Variable Stretch ⋮ Jammin' on the deck ⋮ Implicit key-stretching security of encryption schemes ⋮ Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data ⋮ Simulatable channels: extended security that is universally composable and easier to prove ⋮ RIV for Robust Authenticated Encryption ⋮ On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers ⋮ Steel: composable hardware-based stateful and randomised functional encryption ⋮ Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
Uses Software
Cites Work
- Tweakable block ciphers
- Parallelizable and Authenticated Online Ciphers
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation
- Online Ciphers from Tweakable Blockciphers
- A Provable-Security Treatment of the Key-Wrap Problem
- McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
This page was built for publication: Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance