Abstract. PAES is an authenticated encryption scheme designed by Ye et al., and submitted to the CAESAR competition. The designers claim that PAES-8, which is one of the designs of the PAES-family, provides 128-bit security in the nonce misuse model. In this note, we show our forgery attack against PAES-8. Our attack works in the nonce misuse model. The attack exploits the slow propagation of message differences. The attack is very close to the universal forgery attack. As long as the target message is not too short, e.g. more than 10 blocks (160 bytes), a tag is forged only with 211 encryption oracle calls, 211 computational cost, and negligible memory
Recently, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding...
In this paper, we analyse a block cipher mode of operation submitted in 2014 to the cryptographic co...
© Springer International Publishing Switzerland 2016. iFeed is a blockcipher-based authenticated en...
Abstract. We present two practical attacks on the CAESAR candidate PAES. The first attack is a unive...
We present two practical attacks on the CAESAR candidate PAES. The first attack is a universal forge...
Abstract. PANDA is an authenticated encryption scheme designed by Ye et al., and submitted to the CA...
Abstract. COPA is a block-cipher-based authenticated encryption mode with a provable birthday-bound ...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
Abstract. We present a forgery attack on Prøst-OTR in a related-key setting. Prøst is a family of au...
Authenticated ciphers rely on the uniqueness of the nonces to meet their security goals. In this wor...
Abstract. ALE is a new authenticated encryption algorithm published at FSE 2013. The authentication ...
Abstract. In FSE 2014, an authenticated encryption mode COBRA [4], based on pseudorandom per-mutatio...
Abstract. ICEPOLE is a family of authenticated encryptions schemes submitted to the ongoing CAESAR c...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
We present a new cryptanalysis approach to analyze the security of a class of authenticated encrypti...
Recently, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding...
In this paper, we analyse a block cipher mode of operation submitted in 2014 to the cryptographic co...
© Springer International Publishing Switzerland 2016. iFeed is a blockcipher-based authenticated en...
Abstract. We present two practical attacks on the CAESAR candidate PAES. The first attack is a unive...
We present two practical attacks on the CAESAR candidate PAES. The first attack is a universal forge...
Abstract. PANDA is an authenticated encryption scheme designed by Ye et al., and submitted to the CA...
Abstract. COPA is a block-cipher-based authenticated encryption mode with a provable birthday-bound ...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
Abstract. We present a forgery attack on Prøst-OTR in a related-key setting. Prøst is a family of au...
Authenticated ciphers rely on the uniqueness of the nonces to meet their security goals. In this wor...
Abstract. ALE is a new authenticated encryption algorithm published at FSE 2013. The authentication ...
Abstract. In FSE 2014, an authenticated encryption mode COBRA [4], based on pseudorandom per-mutatio...
Abstract. ICEPOLE is a family of authenticated encryptions schemes submitted to the ongoing CAESAR c...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
We present a new cryptanalysis approach to analyze the security of a class of authenticated encrypti...
Recently, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding...
In this paper, we analyse a block cipher mode of operation submitted in 2014 to the cryptographic co...
© Springer International Publishing Switzerland 2016. iFeed is a blockcipher-based authenticated en...