The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of two parallelizable encryption layers connected by a linear mixing function. While COPA uses plain XOR mixing, ELmE, ELmD, and COLM use a more involved invertible mixing function. In this work, we investigate the integrity of the COLM structure when unverified plaintext is released, and demonstrate that its security highly depends on the choice of mixing function. Our results are threefold. First, we discuss the practical nonce-respecting forgery by Andreeva et al. (ASIACRYPT 2014) against COPA’s XOR mixing. Then we present a noncemisusing forgery against arbitrary mixing functions wi...
MORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR competition, ...
iFeed is a blockcipher-based authenticated encryption design by Zhang, Wu, Sui, and Wang and a first...
Authenticated encryption schemes are usually expected to offer confidentiality and authenticity. In ...
The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much ...
The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much ...
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as...
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
Authenticated ciphers rely on the uniqueness of the nonces to meet their security goals. In this wor...
We propose definitions and constructions of authenticated encryption (AE) schemes that offer securit...
Abstract. COPA is a block-cipher-based authenticated encryption mode with a provable birthday-bound ...
Leakage resilience (LR) and misuse resistance (MR) are two important properties for the deployment o...
© Springer International Publishing Switzerland 2016. iFeed is a blockcipher-based authenticated en...
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidential...
MORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR competition, ...
iFeed is a blockcipher-based authenticated encryption design by Zhang, Wu, Sui, and Wang and a first...
Authenticated encryption schemes are usually expected to offer confidentiality and authenticity. In ...
The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much ...
The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much ...
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as...
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
Authenticated ciphers rely on the uniqueness of the nonces to meet their security goals. In this wor...
We propose definitions and constructions of authenticated encryption (AE) schemes that offer securit...
Abstract. COPA is a block-cipher-based authenticated encryption mode with a provable birthday-bound ...
Leakage resilience (LR) and misuse resistance (MR) are two important properties for the deployment o...
© Springer International Publishing Switzerland 2016. iFeed is a blockcipher-based authenticated en...
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidential...
MORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR competition, ...
iFeed is a blockcipher-based authenticated encryption design by Zhang, Wu, Sui, and Wang and a first...
Authenticated encryption schemes are usually expected to offer confidentiality and authenticity. In ...