GIFT-COFB is a finalist of NIST Lightweight cryptography project that aims at standardizing authenticated encryption schemes for constrained devices. It is a block cipher-based scheme and comes with a provable security result. This paper studies the tightness of the provable security bounds of GIFT-COFB, which roughly tells that, if instantiated by a secure $n$-bit block cipher, we need $2^{n/2}$ encrypted blocks or $2^{n/2}/n$ decryption queries to break the scheme. This paper shows that the former condition is indeed tight, by presenting forgery attacks that work with $2^{n/2}$ encrypted blocks with single decryption query. This fills the missing spot of previous attacks presented by Khairallah, and confirms the tightness of the security ...
In this paper, we present a generic construction to create a secure tweakable block cipher from a se...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
International audienceIn this work, we propose a construction of 2-round tweakable substitution perm...
In this article, we analyze and investigate two authenticated encryption algorithms: GIFT-COFB and H...
In this article, we propose GIFT-COFB, an Authenticated Encryption with Associated Data (AEAD) schem...
This paper considers the linear cryptanalyses of Authenticated Encryptions with Associated Data (AEA...
This talk presents an overview of recently developed encryption mode for blockciphers, called CENC....
This talk presents an overview of recently developed encryption mode for blockciphers, called CENC....
This paper presents a lightweight blockcipher based authenticated encryption mode mainly focusing on...
In this work, we study the security of several recent MAC constructions with provable security beyon...
OCB3 is the current version of the OCB authenticated encryption mode which is selected for the third...
The Cascaded LRW2 tweakable block cipher was introduced by Landecker et al. at CRYPTO 2012, and prov...
An universal forgery attack means that for any given message $M$, an adversary without the key can f...
Coron et al. showed a construction of a 3-round 2n-bit cryptographic permutation from three independ...
peer reviewedIn this paper, we present a generic construction to create a secure tweakable block cip...
In this paper, we present a generic construction to create a secure tweakable block cipher from a se...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
International audienceIn this work, we propose a construction of 2-round tweakable substitution perm...
In this article, we analyze and investigate two authenticated encryption algorithms: GIFT-COFB and H...
In this article, we propose GIFT-COFB, an Authenticated Encryption with Associated Data (AEAD) schem...
This paper considers the linear cryptanalyses of Authenticated Encryptions with Associated Data (AEA...
This talk presents an overview of recently developed encryption mode for blockciphers, called CENC....
This talk presents an overview of recently developed encryption mode for blockciphers, called CENC....
This paper presents a lightweight blockcipher based authenticated encryption mode mainly focusing on...
In this work, we study the security of several recent MAC constructions with provable security beyon...
OCB3 is the current version of the OCB authenticated encryption mode which is selected for the third...
The Cascaded LRW2 tweakable block cipher was introduced by Landecker et al. at CRYPTO 2012, and prov...
An universal forgery attack means that for any given message $M$, an adversary without the key can f...
Coron et al. showed a construction of a 3-round 2n-bit cryptographic permutation from three independ...
peer reviewedIn this paper, we present a generic construction to create a secure tweakable block cip...
In this paper, we present a generic construction to create a secure tweakable block cipher from a se...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
International audienceIn this work, we propose a construction of 2-round tweakable substitution perm...