Efficient schemes for committing authenticated encryption

M Bellare, VT Hoang - Annual International Conference on the Theory and …, 2022 - Springer
This paper provides efficient authenticated-encryption (AE) schemes in which a ciphertext is
a commitment to the key. These are extended, at minimal additional cost, to schemes where …

The multi-user security of authenticated encryption: AES-GCM in TLS 1.3

M Bellare, B Tackmann - Advances in Cryptology–CRYPTO 2016: 36th …, 2016 - Springer
We initiate the study of multi-user (mu) security of authenticated encryption (AE) schemes as
a way to rigorously formulate, and answer, questions about the “randomized nonce” …

Key-alternating ciphers and key-length extension: exact bounds and multi-user security

VT Hoang, S Tessaro - Advances in Cryptology–CRYPTO 2016: 36th …, 2016 - Springer
The best existing bounds on the concrete security of key-alternating ciphers (Chen and
Steinberger, EUROCRYPT'14) are only asymptotically tight, and the quantitative gap with …

Full-state keyed duplex with built-in multi-user support

J Daemen, B Mennink, G Van Assche - … on the Theory and Applications of …, 2017 - Springer
The keyed duplex construction was introduced by Bertoni et al.(SAC 2011) and recently
generalized to full-state absorption by Mennink et al.(ASIACRYPT 2015). We present a …

Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds

P Bose, VT Hoang, S Tessaro - … on the Theory and Applications of …, 2018 - Springer
This paper revisits the multi-user (mu) security of symmetric encryption, from the perspective
of delivering an analysis of the AES-GCM-SIV AEAD scheme. Our end result shows that its …

Simpira v2: A family of efficient permutations using the AES round function

S Gueron, N Mouha - International Conference on the Theory and …, 2016 - Springer
This paper introduces Simpira, a family of cryptographic permutations that supports inputs of
128 * b bits, where b is a positive integer. Its design goal is to achieve high throughput on …

Analyzing multi-key security degradation

A Luykx, B Mennink, KG Paterson - … on the Theory and Applications of …, 2017 - Springer
The multi-key, or multi-user, setting challenges cryptographic algorithms to maintain high
levels of security when used with many different keys, by many different users. Its …

Improved multi-user security using the squared-ratio method

YL Chen, W Choi, C Lee - Annual International Cryptology Conference, 2023 - Springer
Proving security bounds in contexts with a large number of users is one of the central
problems in symmetric-key cryptography today. This paper introduces a new method for …

Hash-function based PRFs: AMAC and its multi-user security

M Bellare, DJ Bernstein, S Tessaro - … on the Theory and Applications of …, 2016 - Springer
AMAC AMAC is a simple and fast candidate construction of a PRF from an MD-style hash
function which applies the keyed hash function and then a cheap, un-keyed output transform …

The multi-user security of double encryption

VT Hoang, S Tessaro - Annual International Conference on the Theory and …, 2017 - Springer
It is widely known that double encryption does not substantially increase the security of a
block cipher. Indeed, the classical meet-in-the middle attack recovers the 2 k-bit secret key at …