We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional block ciphers. Our new schemes are either stateless and deterministic, nonce-based, or randomized, and provably secure either in the standard model for tweakable block cipher-based ones, or in the ideal cipher model for block cipher-based ones. All our constructions are very efficient, requiring only one call to the underlying (tweakable) block cipher in addition to universally hashing the message. Moreover, the security bounds we obtain are quite strong: they are beyond the birthday bound, and nonce-based/randomized variants provide graceful security degradation in case of misuse, i.e., the security bound degrades linearly with the maximal nu...
Abstract. “Hash then encrypt ” is an approach to message authentica-tion, where first the message is...
Abstract. We revisit the randomized approach followed in the design of the RMAC message authenticati...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional b...
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional b...
Abstract. We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher...
Abstract. The security of randomized message authentication code, MAC for short, is typically depend...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
Observing the growing popularity of random permutation (RP)-based designs (e.g, Sponge), Bart Mennin...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message a...
We propose a new mode of operation called ZMAC allowing to construct a (stateless and deterministic)...
Abstract. “Hash then encrypt ” is an approach to message authentica-tion, where first the message is...
Abstract. We revisit the randomized approach followed in the design of the RMAC message authenticati...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional b...
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional b...
Abstract. We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher...
Abstract. The security of randomized message authentication code, MAC for short, is typically depend...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
Observing the growing popularity of random permutation (RP)-based designs (e.g, Sponge), Bart Mennin...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message a...
We propose a new mode of operation called ZMAC allowing to construct a (stateless and deterministic)...
Abstract. “Hash then encrypt ” is an approach to message authentica-tion, where first the message is...
Abstract. We revisit the randomized approach followed in the design of the RMAC message authenticati...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...