The keyed sponge is a well-accepted method for message authentication. It processes data at a certain rate by sequential evaluation of an underlying permutation. If the key size k is smaller than the rate, currently known bounds are tight, but if it exceeds the rate, state of the art only dictates security up to 2k/2. We take closer inspection at the key prediction security of the sponge and close the remaining gap in the existing security analysis: we confirm key security up to close to 2k, regardless of the rate. The result impacts all applications of the keyed sponge and duplex that process at a rate smaller than the key size, including the STROBE protocol framework, as well as the related constructions such as HMAC-SHA-3 and the sandwic...
Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide both conf...
This paper studies the concrete security of PRFs and MACs obtained by keying hash functions based on...
Abstract—Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide ...
The keyed sponge is a well-accepted method for message authentication. It processes data at a certai...
The keyed sponge is a well-accepted method for message authentication. It processes data at a certai...
© International Association for Cryptologic Research 2015. Sponge functions were originally proposed...
We formalize and analyze the general suffix keyed sponge construction, a pseudorandom function built...
© International Association for Cryptologic Research 2015. We provide a security analysis for full-s...
© International Association for Cryptologic Research 2014. The Sponge function is known to achieve ...
The sponge duplex is a popular mode of operation for constructing authenticated encryption schemes. ...
We provide a security analysis for full-state keyed Sponge and full-state Duplex constructions. Our ...
Abstract. The Sponge function is known to achieve 2c/2 security, where c is its capacity. This bound...
The cryptographic sponge is a popular method for hash function design. The construction is in the id...
This paper studies the concrete security of PRFs and MACs obtained by keying hash functions based on...
Hash message authentication is a fundamental building block of many networking security protocols su...
Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide both conf...
This paper studies the concrete security of PRFs and MACs obtained by keying hash functions based on...
Abstract—Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide ...
The keyed sponge is a well-accepted method for message authentication. It processes data at a certai...
The keyed sponge is a well-accepted method for message authentication. It processes data at a certai...
© International Association for Cryptologic Research 2015. Sponge functions were originally proposed...
We formalize and analyze the general suffix keyed sponge construction, a pseudorandom function built...
© International Association for Cryptologic Research 2015. We provide a security analysis for full-s...
© International Association for Cryptologic Research 2014. The Sponge function is known to achieve ...
The sponge duplex is a popular mode of operation for constructing authenticated encryption schemes. ...
We provide a security analysis for full-state keyed Sponge and full-state Duplex constructions. Our ...
Abstract. The Sponge function is known to achieve 2c/2 security, where c is its capacity. This bound...
The cryptographic sponge is a popular method for hash function design. The construction is in the id...
This paper studies the concrete security of PRFs and MACs obtained by keying hash functions based on...
Hash message authentication is a fundamental building block of many networking security protocols su...
Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide both conf...
This paper studies the concrete security of PRFs and MACs obtained by keying hash functions based on...
Abstract—Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide ...