Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
Cryptanalysis of OCB2: attacks on authenticity and confidentiality
A Inoue, T Iwata, K Minematsu, B Poettering - Journal of Cryptology, 2020 - Springer
We present practical attacks on OCB2. This mode of operation of a blockcipher was
designed with the aim to provide particularly efficient and provably secure authenticated …
designed with the aim to provide particularly efficient and provably secure authenticated …
TNT: how to tweak a block cipher
In this paper, we propose Tweak-aNd-Tweak (TNT TNT for short) mode, which builds a
tweakable block cipher from three independent block ciphers. TNT TNT handles the tweak …
tweakable block cipher from three independent block ciphers. TNT TNT handles the tweak …
Beyond birthday bound secure fresh rekeying: Application to authenticated encryption
B Mennink - International Conference on the Theory and …, 2020 - Springer
Fresh rekeying is a well-established method to protect a primitive or mode against side-
channel attacks: an easy to protect but cryptographically not so involved function generates …
channel attacks: an easy to protect but cryptographically not so involved function generates …
Provably quantum-secure tweakable block ciphers
A Hosoyamada, T Iwata - IACR Transactions on Symmetric Cryptology, 2021 - tosc.iacr.org
Recent results on quantum cryptanalysis show that some symmetric key schemes can be
broken in polynomial time even if they are proven to be secure in the classical setting …
broken in polynomial time even if they are proven to be secure in the classical setting …
Key structures: improved related-key boomerang attack against the full AES-256
This paper introduces structure to key, in the related-key attack settings. While the idea of
structure has been long used in key-recovery attacks against block ciphers to enjoy the …
structure has been long used in key-recovery attacks against block ciphers to enjoy the …
Offset-based bbb-secure tweakable block-ciphers with updatable caches
A nonce-respecting tweakable blockcipher is the building-block for the OCB authenticated
encryption mode. An XEX-based TBC is used to process each block in OCB. However, XEX …
encryption mode. An XEX-based TBC is used to process each block in OCB. However, XEX …
Pholkos–efficient large-state tweakable block ciphers from the AES round function
J Bossert, E List, S Lucks, S Schmitz - Cryptographers' Track at the RSA …, 2022 - Springer
This paper proposes Pholkos, a family of heavyweight tweakable block ciphers with state
and key sizes of≥ 256 and tweaks of either 128 or 256 bits. When encrypting large chunks …
and key sizes of≥ 256 and tweaks of either 128 or 256 bits. When encrypting large chunks …
On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing
In this paper, we provide the first analysis of the Iterated Tweakable Even-Mansour cipher
with linear tweak and key (or tweakey) mixing, henceforth referred as TEML, for an arbitrary …
with linear tweak and key (or tweakey) mixing, henceforth referred as TEML, for an arbitrary …
Towards closing the security gap of Tweak-aNd-Tweak (TNT)
Tweakable block ciphers (TBCs) have been established as a valuable replacement for many
applications of classical block ciphers. While several dedicated TBCs have been proposed …
applications of classical block ciphers. While several dedicated TBCs have been proposed …