+

Berti et al., 2018 - Google Patents

Reconsidering generic composition: the tag-then-encrypt case

Berti et al., 2018

View PDF
Document ID
11664110016934475615
Author
Berti F
Pereira O
Peters T
Publication year
Publication venue
International Conference on Cryptology in India

External Links

Snippet

Authenticated Encryption () achieves confidentiality and authenticity, the two most fundamental goals of cryptography, in a single scheme. A common strategy to obtain is to combine a Message Authentication Code and an encryption scheme, either nonce-based or …
Continue reading at eprint.iacr.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Bellare et al. The multi-user security of authenticated encryption: AES-GCM in TLS 1.3
Beullens et al. Group signatures and more from isogenies and lattices: Generic, simple, and efficient
Jost et al. Efficient ratcheting: Almost-optimal guarantees for secure messaging
Grubbs et al. Message franking via committing authenticated encryption
Luykx et al. Analyzing multi-key security degradation
Inoue et al. Cryptanalysis of OCB2: attacks on authenticity and confidentiality
Fischlin et al. Self-guarding cryptographic protocols against algorithm substitution attacks
Bellare et al. Nonces are noticed: AEAD revisited
Dobraunig et al. Towards fresh and hybrid re-keying schemes with beyond birthday security
Cascudo et al. YOLO YOSO: fast and simple encryption and secret sharing in the YOSO model
Mennink Optimally secure tweakable blockciphers
Menda et al. Context discovery and commitment attacks: How to break ccm, eax, siv, and more
Locher et al. Coercion-resistant internet voting with everlasting privacy
Bradley et al. Strong asymmetric PAKE based on trapdoor CKEM
Ateniese et al. Public immunization against complete subversion without random oracles
Santos et al. Randomized half-ideal cipher on groups with applications to UC (a) PAKE
Hosoyamada et al. On tight quantum security of HMAC and NMAC in the quantum random oracle model
Libert et al. Structure-preserving chosen-ciphertext security with shorter verifiable ciphertexts
Nunez et al. A parametric family of attack models for proxy re-encryption
Berti et al. Reconsidering generic composition: the tag-then-encrypt case
Hoang et al. Selective-opening security in the presence of randomness failures
Pu et al. Post quantum fuzzy stealth signatures and applications
Lyu et al. Universal composable password authenticated key exchange for the post-quantum world
Hesse et al. PAKE combiners and efficient post-quantum instantiations
Eaton et al. Security analysis of signature schemes with key blinding
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载