Berti et al., 2018 - Google Patents
Reconsidering generic composition: the tag-then-encrypt caseBerti et al., 2018
View PDF- Document ID
- 11664110016934475615
- Author
- Berti F
- Pereira O
- Peters T
- Publication year
- Publication venue
- International Conference on Cryptology in India
External Links
Snippet
Authenticated Encryption () achieves confidentiality and authenticity, the two most fundamental goals of cryptography, in a single scheme. A common strategy to obtain is to combine a Message Authentication Code and an encryption scheme, either nonce-based or …
- 239000000203 mixture 0 title abstract description 26
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bellare et al. | The multi-user security of authenticated encryption: AES-GCM in TLS 1.3 | |
| Beullens et al. | Group signatures and more from isogenies and lattices: Generic, simple, and efficient | |
| Jost et al. | Efficient ratcheting: Almost-optimal guarantees for secure messaging | |
| Grubbs et al. | Message franking via committing authenticated encryption | |
| Luykx et al. | Analyzing multi-key security degradation | |
| Inoue et al. | Cryptanalysis of OCB2: attacks on authenticity and confidentiality | |
| Fischlin et al. | Self-guarding cryptographic protocols against algorithm substitution attacks | |
| Bellare et al. | Nonces are noticed: AEAD revisited | |
| Dobraunig et al. | Towards fresh and hybrid re-keying schemes with beyond birthday security | |
| Cascudo et al. | YOLO YOSO: fast and simple encryption and secret sharing in the YOSO model | |
| Mennink | Optimally secure tweakable blockciphers | |
| Menda et al. | Context discovery and commitment attacks: How to break ccm, eax, siv, and more | |
| Locher et al. | Coercion-resistant internet voting with everlasting privacy | |
| Bradley et al. | Strong asymmetric PAKE based on trapdoor CKEM | |
| Ateniese et al. | Public immunization against complete subversion without random oracles | |
| Santos et al. | Randomized half-ideal cipher on groups with applications to UC (a) PAKE | |
| Hosoyamada et al. | On tight quantum security of HMAC and NMAC in the quantum random oracle model | |
| Libert et al. | Structure-preserving chosen-ciphertext security with shorter verifiable ciphertexts | |
| Nunez et al. | A parametric family of attack models for proxy re-encryption | |
| Berti et al. | Reconsidering generic composition: the tag-then-encrypt case | |
| Hoang et al. | Selective-opening security in the presence of randomness failures | |
| Pu et al. | Post quantum fuzzy stealth signatures and applications | |
| Lyu et al. | Universal composable password authenticated key exchange for the post-quantum world | |
| Hesse et al. | PAKE combiners and efficient post-quantum instantiations | |
| Eaton et al. | Security analysis of signature schemes with key blinding |