A Provable-Security Treatment of the Key-Wrap Problem

From MaRDI portal
Publication:3593107

DOI10.1007/11761679_23zbMath1140.94369OpenAlexW1855109561MaRDI QIDQ3593107

Phillip Rogaway, Thomas Shrimpton

Publication date: 24 September 2007

Published in: Advances in Cryptology - EUROCRYPT 2006 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11761679_23




Related Items (71)

Another Look at TightnessDuplexing the Sponge: Single-Pass Authenticated Encryption and Other ApplicationsNonce-misuse security of the SAEF authenticated encryption modeOn modes of operations of a block cipher for authentication and authenticated encryptionHidden shift quantum cryptanalysis and implicationsOptimizing Online Permutation-Based AE Schemes for Lightweight ApplicationsAEZ: Anything-But EaZy in HardwareOnline Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryptionRogue Decryption Failures: Reconciling AE Robustness NotionsRobust Authenticated Encryption and the Limits of Symmetric CryptographyOn fingerprinting attacks and length-hiding encryptionRevisiting AES-GCM-SIV: multi-user security, faster key derivation, and better boundsEfficient schemes for committing authenticated encryptionAttacks and Security Proofs of EAX-PrimeOn Symmetric Encryption with Distinguishable Decryption Failures$\mathsf{sMGM}$: parameterizable AEAD modeAuthenticated encryption for very short inputsFlexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacksTargeted invertible pseudorandom functions and deterministic format-transforming encryptionXOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computationBlockcipher-based authenticated encryption: how small can we go?Integrity Analysis of Authenticated Encryption Based on Stream CiphersContext discovery and commitment attacks. How to break CCM, EAX, SIV, and moreAuthenticated Encryption Mode for Beyond the Birthday Bound SecurityAuthenticated Encryption with Variable StretchJammin' on the deckA modular approach to the incompressibility of block-cipher-based AEADsPuncturable key wrapping and its applicationsHow fast can SM4 be in software?On the related-key attack security of authenticated encryption schemesAuthenticated encryption with key identificationHow to build a trapdoor function from an encryption schemeToward a fully secure authenticated encryption scheme from a pseudorandom permutation\textsf{tHyENA}: making \textsf{HyENA} even smaller\textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipherOverloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channelsParaDiSE: efficient threshold authenticated encryption in fully malicious modelOffset-based BBB-secure tweakable block-ciphers with updatable cachesInstantiability of classical random-oracle-model encryption transformsImplicit key-stretching security of encryption schemesOn the post-quantum security of classical authenticated encryption schemesHow to build optimally secure PRFs using block ciphersWeak Keys for AEZ, and the External Key Padding AttackSimulatable channels: extended security that is universally composable and easier to proveRIV for Robust Authenticated EncryptionThe design and evolution of OCBThe Software Performance of Authenticated-Encryption ModesModes of operations for encryption and authentication using stream ciphers supporting an initialisation vectorBreaking LWC candidates: sESTATE and Elephant in quantum settingNonce-Based Key Agreement Protocol Against Bad RandomnessThe Oribatida v1.3 family of lightweight authenticated encryption schemesThe \texttt{Deoxys} AEAD familyOrder-Preserving Symmetric EncryptionA Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksNear birthday attack on “$8$ bits” $\mathsf{AEAD}$ modeEfficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal StretchAuthenticated Encryption with Small Stretch (or, How to Accelerate AERO)Authenticated encryption: relations among notions and analysis of the generic composition paradigm\textsf{FAST}: disk encryption and beyondBeyond conventional security in sponge-based authenticated encryption modesSecurity of Hash-then-CBC Key Wrapping RevisitedCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersThe Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3A Modular Treatment of Cryptographic APIs: The Symmetric-Key CaseHandling adaptive compromise for practical encryption schemesIndifferentiability for public key cryptosystemsThe memory-tightness of authenticated encryptionThe summation-truncation hybrid: reusing discarded bits for freeMode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungleAnalyzing the provable security bounds of GIFT-COFB and Photon-Beetle



Cites Work


This page was built for publication: A Provable-Security Treatment of the Key-Wrap Problem