Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more
From MaRDI portal
Publication:6083136
DOI10.1007/978-3-031-30634-1_13zbMath1528.94072MaRDI QIDQ6083136
Julia Len, Paul Grubbs, Thomas Ristenpart, Sanketh Menda
Publication date: 8 December 2023
Published in: Advances in Cryptology – EUROCRYPT 2023 (Search for Journal in Brave)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- Fast message franking: from invisible salamanders to encryptment
- Message franking via committing authenticated encryption
- The full cost of cryptanalytic attacks
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
- Efficient schemes for committing authenticated encryption
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Careful with Composition: Limitations of the Indifferentiability Framework
- The Software Performance of Authenticated-Encryption Modes
- Robust Encryption
- A Provable-Security Treatment of the Key-Wrap Problem
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Format-Preserving Encryption
- Robust Encryption, Revisited
- Reconsidering Generic Composition
- Fast Software Encryption
- How to protect DES against exhaustive key search (an analysis of DESX).
This page was built for publication: Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more