In this paper, we analyse a block cipher mode of operation submitted in 2014 to the cryptographic competition for authenticated encryption (CAESAR). This mode is designed by Recacha and called ++AE (plus-plus-ae). We propose a chosen plaintext forgery attack on ++AE that requires only a single chosen message query to allow an attacker to construct multiple forged messages. Our attack is deterministic and guaranteed to pass ++AE integrity check. We demonstrate the forgery attack using 128-bit AES as the underlying block cipher. Hence, ++AE is insecure as an authenticated encryption mode of operation
In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook...
We present two practical attacks on the CAESAR candidate PAES. The first attack is a universal forge...
© Springer International Publishing Switzerland 2016. iFeed is a blockcipher-based authenticated en...
In this article, we analyse a block cipher mode of operation for authenticated encryption known as +...
Information assets stored or transmitted electronically require protection from unauthorised disclos...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
Secure and efficient authenticated encryption (AE) constructions are important for protecting modern...
Abstract. In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offse...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
Abstract. ALE is a new authenticated encryption algorithm published at FSE 2013. The authentication ...
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality...
Abstract. In FSE 2014, an authenticated encryption mode COBRA [4], based on pseudorandom per-mutatio...
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality...
In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook...
We present two practical attacks on the CAESAR candidate PAES. The first attack is a universal forge...
© Springer International Publishing Switzerland 2016. iFeed is a blockcipher-based authenticated en...
In this article, we analyse a block cipher mode of operation for authenticated encryption known as +...
Information assets stored or transmitted electronically require protection from unauthorised disclos...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
Secure and efficient authenticated encryption (AE) constructions are important for protecting modern...
Abstract. In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offse...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
Abstract. ALE is a new authenticated encryption algorithm published at FSE 2013. The authentication ...
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality...
Abstract. In FSE 2014, an authenticated encryption mode COBRA [4], based on pseudorandom per-mutatio...
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality...
In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook...
We present two practical attacks on the CAESAR candidate PAES. The first attack is a universal forge...
© Springer International Publishing Switzerland 2016. iFeed is a blockcipher-based authenticated en...