At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme that remains secure even if the nonce is repeated. While this is an advantage over the original GCM, we first point out that GCM-SIV allows a trivial distinguishing attack with about 248 queries, where each query has one plaintext block. This shows the tightness of the security claim and does not contradict the provable security result. However, the original GCM resists the attack, and this poses a question of designing a variant of GCM-SIV that is secure against the attack. We present a minor variant of GCM-SIV, which we call GCM-SIV1, and discuss that GCM-SIV1 resists the attack, and it offers a security trade-off compared to GCM-SIV. As th...
peer reviewedWe propose a new authenticated encryption scheme PAEQ, which employs a fixed public per...
peer reviewedWe propose a new authenticated encryption scheme PAEQ, which employs a fixed public per...
We analyze the multi-user (mu) security of a family of nonce-based authentication encryption (nAE) s...
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme ...
In this paper, we describe and analyze the security of the AES-GCM-SIV mode of operation, as defined...
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption sc...
GCM-SIV2 is a nonce-based beyond-birthday-bound (BBB)-secure authenticated encryption (AE) mode intr...
The Galois/Counter Mode of operation (GCM) is a widely used nonce-based authenticated encryption wit...
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidential...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a no...
In this work, we study the security of several recent MAC constructions with provable security beyon...
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption sc...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
peer reviewedWe propose a new authenticated encryption scheme PAEQ, which employs a fixed public per...
peer reviewedWe propose a new authenticated encryption scheme PAEQ, which employs a fixed public per...
We analyze the multi-user (mu) security of a family of nonce-based authentication encryption (nAE) s...
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme ...
In this paper, we describe and analyze the security of the AES-GCM-SIV mode of operation, as defined...
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption sc...
GCM-SIV2 is a nonce-based beyond-birthday-bound (BBB)-secure authenticated encryption (AE) mode intr...
The Galois/Counter Mode of operation (GCM) is a widely used nonce-based authenticated encryption wit...
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidential...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a no...
In this work, we study the security of several recent MAC constructions with provable security beyon...
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption sc...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
peer reviewedWe propose a new authenticated encryption scheme PAEQ, which employs a fixed public per...
peer reviewedWe propose a new authenticated encryption scheme PAEQ, which employs a fixed public per...
We analyze the multi-user (mu) security of a family of nonce-based authentication encryption (nAE) s...