Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

Cryptanalysis of OCB2: attacks on authenticity and confidentiality

A Inoue, T Iwata, K Minematsu, B Poettering - Journal of Cryptology, 2020 - Springer
We present practical attacks on OCB2. This mode of operation of a blockcipher was
designed with the aim to provide particularly efficient and provably secure authenticated …

TNT: how to tweak a block cipher

Z Bao, C Guo, J Guo, L Song - … International Conference on the Theory and …, 2020 - Springer
In this paper, we propose Tweak-aNd-Tweak (TNT TNT for short) mode, which builds a
tweakable block cipher from three independent block ciphers. TNT TNT handles the tweak …

Beyond birthday bound secure fresh rekeying: Application to authenticated encryption

B Mennink - International Conference on the Theory and …, 2020 - Springer
Fresh rekeying is a well-established method to protect a primitive or mode against side-
channel attacks: an easy to protect but cryptographically not so involved function generates …

Provably quantum-secure tweakable block ciphers

A Hosoyamada, T Iwata - IACR Transactions on Symmetric Cryptology, 2021 - tosc.iacr.org
Recent results on quantum cryptanalysis show that some symmetric key schemes can be
broken in polynomial time even if they are proven to be secure in the classical setting …

Key structures: improved related-key boomerang attack against the full AES-256

J Guo, L Song, H Wang - … Conference on Information Security and Privacy, 2022 - Springer
This paper introduces structure to key, in the related-key attack settings. While the idea of
structure has been long used in key-recovery attacks against block ciphers to enjoy the …

Offset-based bbb-secure tweakable block-ciphers with updatable caches

A Bhattacharjee, R Bhaumik, M Nandi - International Conference on …, 2022 - Springer
A nonce-respecting tweakable blockcipher is the building-block for the OCB authenticated
encryption mode. An XEX-based TBC is used to process each block in OCB. However, XEX …

Pholkos–efficient large-state tweakable block ciphers from the AES round function

J Bossert, E List, S Lucks, S Schmitz - Cryptographers' Track at the RSA …, 2022 - Springer
This paper proposes Pholkos, a family of heavyweight tweakable block ciphers with state
and key sizes of≥ 256 and tweaks of either 128 or 256 bits. When encrypting large chunks …

On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing

B Cogliati, J Ethan, A Jha, SK Saha - IACR Transactions on Symmetric …, 2023 - tosc.iacr.org
In this paper, we provide the first analysis of the Iterated Tweakable Even-Mansour cipher
with linear tweak and key (or tweakey) mixing, henceforth referred as TEML, for an arbitrary …

Towards closing the security gap of Tweak-aNd-Tweak (TNT)

C Guo, J Guo, E List, L Song - … 2020: 26th International Conference on the …, 2020 - Springer
Tweakable block ciphers (TBCs) have been established as a valuable replacement for many
applications of classical block ciphers. While several dedicated TBCs have been proposed …