The Galois/Counter Mode of operation (GCM) is a widely used nonce-based authenticated encryption with associated data mode which provides the birthday-bound security in the nonce-respecting scenario; that is, it is secure up to about 2n/2 adversarial queries if all nonces used in the encryption oracle are never repeated, where n is the block size. It is an open problem to analyze whether GCM security can be improved by using some simple operations. This paper presents a positive response for this problem. Firstly, we introduce two close to optimally secure pseudorandom functions and derive their security bound by the hybrid technique. Then, we utilize these pseudorandom functions that we design and a universal hash function to construct two...
Cryptographic modes built on top of a blockcipher usually rely on the assumption that this primitive...
A generalized Feistel structure (GFS) is a classical approach to construct a block cipher from pseud...
© 2018, International Association for Cryptologic Research. We carry out a systematic study of the G...
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme ...
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme ...
GCM-SIV2 is a nonce-based beyond-birthday-bound (BBB)-secure authenticated encryption (AE) mode intr...
In this paper, we describe and analyze the security of the AES-GCM-SIV mode of operation, as defined...
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidential...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption sc...
Abstract. The Galois/Counter Mode (GCM) of operation has been standardized by NIST to provide single...
We present the Galois Message Authentication Code (GMAC), a generic construction based on universal ...
Abstract. The XCB mode of operation was outlined in 2004 as a contribution to the IEEE Security in S...
Cryptographic modes built on top of a blockcipher usually rely on the assumption that this primitive...
Cryptographic modes built on top of a blockcipher usually rely on the assumption that this primitive...
A generalized Feistel structure (GFS) is a classical approach to construct a block cipher from pseud...
© 2018, International Association for Cryptologic Research. We carry out a systematic study of the G...
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme ...
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme ...
GCM-SIV2 is a nonce-based beyond-birthday-bound (BBB)-secure authenticated encryption (AE) mode intr...
In this paper, we describe and analyze the security of the AES-GCM-SIV mode of operation, as defined...
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidential...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption sc...
Abstract. The Galois/Counter Mode (GCM) of operation has been standardized by NIST to provide single...
We present the Galois Message Authentication Code (GMAC), a generic construction based on universal ...
Abstract. The XCB mode of operation was outlined in 2004 as a contribution to the IEEE Security in S...
Cryptographic modes built on top of a blockcipher usually rely on the assumption that this primitive...
Cryptographic modes built on top of a blockcipher usually rely on the assumption that this primitive...
A generalized Feistel structure (GFS) is a classical approach to construct a block cipher from pseud...
© 2018, International Association for Cryptologic Research. We carry out a systematic study of the G...