Designing full-rate \textsf{Sponge} based AEAD modes
From MaRDI portal
Publication:6623296
DOI10.1007/978-3-031-56232-7_5MaRDI QIDQ6623296
Bishwajit Chakraborty, Nilanjan Datta, Mridul Nandi
Publication date: 23 October 2024
Cites Work
- Unnamed Item
- Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
- Beyond conventional security in sponge-based authenticated encryption modes
- Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes
- Sponge-Based Pseudo-Random Number Generators
- The “Coefficients H” Technique
- Blockcipher-Based Authenticated Encryption: How Small Can We Go?
- Tight Security Bounds for Key-Alternating Ciphers
- On the Indifferentiability of the Sponge Construction
This page was built for publication: Designing full-rate \textsf{Sponge} based AEAD modes