Abstract. COPA is a block-cipher-based authenticated encryption mode with a provable birthday-bound security under the assumption that the underlying block cipher is a strong pseudorandom permutation, and its instantiation with the AES block cipher is called AES-COPA. Marble is an AES-based COPA-like authenticated encryption algorithm with a full security. In this paper, we analyse the security of COPA and Mar-ble against universal forgery attacks. We present beyond-birthday-bound (almost) universal forgery attacks on the COPA when used with constant or variable associate data, and present (almost) universal forgery attacks on the Marble when used without associated data or with (variable) as-sociate data. Our attacks on the COPA with varia...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
Abstract. COFFE is a hash-based authenticated encryption scheme. In the original paper, it was claim...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
The classic forgery attacks on COPA, AES-COPA and Marble authenticated encryption algorithms need to...
Abstract. In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offse...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook...
An universal forgery attack means that for any given message $M$, an adversary without the key can f...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
Abstract. In FSE 2014, an authenticated encryption mode COBRA [4], based on pseudorandom per-mutatio...
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidential...
Abstract. PAES is an authenticated encryption scheme designed by Ye et al., and submitted to the CAE...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
Abstract. COFFE is a hash-based authenticated encryption scheme. In the original paper, it was claim...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
The classic forgery attacks on COPA, AES-COPA and Marble authenticated encryption algorithms need to...
Abstract. In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offse...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook...
An universal forgery attack means that for any given message $M$, an adversary without the key can f...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
Abstract. In FSE 2014, an authenticated encryption mode COBRA [4], based on pseudorandom per-mutatio...
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidential...
Abstract. PAES is an authenticated encryption scheme designed by Ye et al., and submitted to the CAE...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
Abstract. COFFE is a hash-based authenticated encryption scheme. In the original paper, it was claim...