Efficient schemes for committing authenticated encryption
This paper provides efficient authenticated-encryption (AE) schemes in which a ciphertext is
a commitment to the key. These are extended, at minimal additional cost, to schemes where …
a commitment to the key. These are extended, at minimal additional cost, to schemes where …
The multi-user security of authenticated encryption: AES-GCM in TLS 1.3
M Bellare, B Tackmann - Advances in Cryptology–CRYPTO 2016: 36th …, 2016 - Springer
We initiate the study of multi-user (mu) security of authenticated encryption (AE) schemes as
a way to rigorously formulate, and answer, questions about the “randomized nonce” …
a way to rigorously formulate, and answer, questions about the “randomized nonce” …
Key-alternating ciphers and key-length extension: exact bounds and multi-user security
The best existing bounds on the concrete security of key-alternating ciphers (Chen and
Steinberger, EUROCRYPT'14) are only asymptotically tight, and the quantitative gap with …
Steinberger, EUROCRYPT'14) are only asymptotically tight, and the quantitative gap with …
Full-state keyed duplex with built-in multi-user support
The keyed duplex construction was introduced by Bertoni et al.(SAC 2011) and recently
generalized to full-state absorption by Mennink et al.(ASIACRYPT 2015). We present a …
generalized to full-state absorption by Mennink et al.(ASIACRYPT 2015). We present a …
Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds
This paper revisits the multi-user (mu) security of symmetric encryption, from the perspective
of delivering an analysis of the AES-GCM-SIV AEAD scheme. Our end result shows that its …
of delivering an analysis of the AES-GCM-SIV AEAD scheme. Our end result shows that its …
Simpira v2: A family of efficient permutations using the AES round function
This paper introduces Simpira, a family of cryptographic permutations that supports inputs of
128 * b bits, where b is a positive integer. Its design goal is to achieve high throughput on …
128 * b bits, where b is a positive integer. Its design goal is to achieve high throughput on …
Analyzing multi-key security degradation
The multi-key, or multi-user, setting challenges cryptographic algorithms to maintain high
levels of security when used with many different keys, by many different users. Its …
levels of security when used with many different keys, by many different users. Its …
Improved multi-user security using the squared-ratio method
Proving security bounds in contexts with a large number of users is one of the central
problems in symmetric-key cryptography today. This paper introduces a new method for …
problems in symmetric-key cryptography today. This paper introduces a new method for …
Hash-function based PRFs: AMAC and its multi-user security
AMAC AMAC is a simple and fast candidate construction of a PRF from an MD-style hash
function which applies the keyed hash function and then a cheap, un-keyed output transform …
function which applies the keyed hash function and then a cheap, un-keyed output transform …
The multi-user security of double encryption
It is widely known that double encryption does not substantially increase the security of a
block cipher. Indeed, the classical meet-in-the middle attack recovers the 2 k-bit secret key at …
block cipher. Indeed, the classical meet-in-the middle attack recovers the 2 k-bit secret key at …