Reconsidering Generic Composition
From MaRDI portal
Publication:5418700
DOI10.1007/978-3-642-55220-5_15zbMath1332.94092OpenAlexW2170822045MaRDI QIDQ5418700
Chanathip Namprempre, Phillip Rogaway, Thomas Shrimpton
Publication date: 27 May 2014
Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_15
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (24)
\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption ⋮ Rogue Decryption Failures: Reconciling AE Robustness Notions ⋮ Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds ⋮ Hiding in plain sight: memory-tight proofs via randomness programming ⋮ Efficient schemes for committing authenticated encryption ⋮ Secure storage -- confidentiality and authentication ⋮ Integrity Analysis of Authenticated Encryption Based on Stream Ciphers ⋮ Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more ⋮ Secret can be public: low-memory AEAD mode for high-order masking ⋮ On committing authenticated-encryption ⋮ Authenticated Encryption with Variable Stretch ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ On the related-key attack security of authenticated encryption schemes ⋮ \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher ⋮ Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels ⋮ Sponge-based authenticated encryption: security against quantum attackers ⋮ Implicit key-stretching security of encryption schemes ⋮ ACE in chains: how risky is CBC encryption of binary executable files? ⋮ RIV for Robust Authenticated Encryption ⋮ The design and evolution of OCB ⋮ The \texttt{Deoxys} AEAD family ⋮ Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers ⋮ The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3 ⋮ A symmetric cryptographic scheme for data integrity verification in cloud databases
This page was built for publication: Reconsidering Generic Composition