logo

SCIENCE CHINA Information Sciences, Volume 61, Issue 9: 098104(2018) https://doi.org/10.1007/s11432-017-9253-9

Efficient beyond-birthday-bound secure authenticated encryption modes

More info
  • ReceivedJun 9, 2017
  • AcceptedSep 20, 2017
  • PublishedApr 23, 2018

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported by National Natural Science Foundation of China (Grant Nos. 61522210, 61632013).


Supplement

Appendixes A–F.


References

[1] Iwata T, Minematsu K. Stronger security variants of GCM-SIV. IACR Trans Symmetric Cryptol, 2016, 2016: 134--157. Google Scholar

[2] Peyrin T, Seurin Y. Counter-in-tweak: authenticated encryption modes for tweakable block ciphers. In: Proceedings of the 36th Annual International Cryptology Conference, Santa Barbara, 2016. 33--63. Google Scholar

[3] List E, Nandi M. Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption. In: Proceedings of the Cryptographer's Track at the RSA Conference, San Francisco, 2017. 258--274. Google Scholar

[4] Jovanvic P, Luykx A, Mennink B. Beyond $2^{c/2}$ security in sponge-based authenticated encryption modes. In: Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, 2014. 85--104. Google Scholar

[5] Minematsu K. How to thwart birthday attacks against MACs via small randomness. In: Proceedings of the 17th International Workshop on Fast Software Encryption, Seoul, 2010. 230--249. Google Scholar

[6] Iwata T, Yasuda K. BTM: a single-key, inverse-cipher-free mode for deterministic authenticated encryption. In: Proceedings of the 16th Annual International Workshop on Selected Areas in Cryptography, Calgary, 2009. 313--330. Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1