© International Association for Cryptologic Research 2014. The Sponge function is known to achieve 2 c/2 security, where c is its capacity. This bound was carried over to keyed variants of the function, such as SpongeWrap, to achieve a min{2 c/2 , 2 κ } security bound, with κ the key length. Similarly, many CAESAR competition submissions are designed to comply with the classical 2 c/2 security bound. We show that Sponge-based constructions for authenticated encryption can achieve the significantly higher bound of min{2 b/2 , 2 c , 2 κ } asymptotically, with b > c the permutation size, by proving that the CAESAR submission NORX achieves this bound. Furthermore, we show how to apply the proof to five other Sponge-based CAESAR submissions: As...
Abstract. In authenticated encryption schemes, there are two techniques for handling long ciphertext...
The cryptographic sponge is a popular method for hash function design. The construction is in the id...
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one ...
Abstract. The Sponge function is known to achieve 2c/2 security, where c is its capacity. This bound...
© International Association for Cryptologic Research 2015. Sponge functions were originally proposed...
The sponge duplex is a popular mode of operation for constructing authenticated encryption schemes. ...
The keyed sponge is a well-accepted method for message authentication. It processes data at a certai...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
© International Association for Cryptologic Research 2015. We provide a security analysis for full-s...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
The keyed sponge is a well-accepted method for message authentication. It processes data at a certai...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
The keyed sponge is a well-accepted method for message authentication. It processes data at a certai...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
Abstract. In authenticated encryption schemes, there are two techniques for handling long ciphertext...
The cryptographic sponge is a popular method for hash function design. The construction is in the id...
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one ...
Abstract. The Sponge function is known to achieve 2c/2 security, where c is its capacity. This bound...
© International Association for Cryptologic Research 2015. Sponge functions were originally proposed...
The sponge duplex is a popular mode of operation for constructing authenticated encryption schemes. ...
The keyed sponge is a well-accepted method for message authentication. It processes data at a certai...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
© International Association for Cryptologic Research 2015. We provide a security analysis for full-s...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
The keyed sponge is a well-accepted method for message authentication. It processes data at a certai...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
The keyed sponge is a well-accepted method for message authentication. It processes data at a certai...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
Abstract. In authenticated encryption schemes, there are two techniques for handling long ciphertext...
The cryptographic sponge is a popular method for hash function design. The construction is in the id...
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one ...