On the related-key attack security of authenticated encryption schemes
From MaRDI portal
Publication:6134826
DOI10.1007/978-3-031-14791-3_16zbMath1518.94061MaRDI QIDQ6134826
Juliane Krämer, Maximilian Orlt, Patrick Struck, Sebastian Faust
Publication date: 25 July 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Related-key security for pseudorandom functions beyond the linear barrier
- Sponges resist leakage: the case of authenticated encryption
- Critique of the related-key attack concept
- Optimal Computational Split-state Non-malleable Codes
- Clever Arbiters Versus Malicious Adversaries
- Secure Message Authentication Against Related-Key Attack
- The Related-Key Analysis of Feistel Constructions
- KDM-CCA Security from RKA Secure Authenticated Encryption
- Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions
- On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
- A Single-Key Attack on the Full GOST Block Cipher
- Related-Key Attack on the Full HIGHT
- Cryptography Secure against Related-Key Attacks and Tampering
- Distinguisher and Related-Key Attack on the Full AES-256
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
- A Provable-Security Treatment of the Key-Wrap Problem
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Related-Key Boomerang and Rectangle Attacks
- Reconsidering Generic Composition
- Related-Key Rectangle Attack on the Full SHACAL-1
- Fast Software Encryption
- Fast Software Encryption
- On the related-key attack security of authenticated encryption schemes
This page was built for publication: On the related-key attack security of authenticated encryption schemes