The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of two parallelizable encryption layers connected by a linear mixing function. While COPA uses plain XOR mixing, ELmE, ELmD, and COLM use a more involved invertible mixing function. In this work, we investigate the integrity of the COLM structure when unverified plaintext is released, and demonstrate that its security highly depends on the choice of mixing function. Our results are threefold. First, we discuss the practical nonce-respecting forgery by Andreeva et al. (ASIACRYPT 2014) against COPA\u27s XOR mixing. Then we present a nonce-misusing forgery against arbitrary mixing function...
Authenticated encryption schemes are usually expected to offer confidentiality and authenticity. In ...
Leakage resilience (LR) and misuse resistance (MR) are two important properties for the deployment o...
iFeed is a blockcipher-based authenticated encryption design by Zhang, Wu, Sui, and Wang and a first...
The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much ...
The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much ...
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as...
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as...
Authenticated ciphers rely on the uniqueness of the nonces to meet their security goals. In this wor...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
We propose definitions and constructions of authenticated encryption (AE) schemes that offer securit...
Abstract. COPA is a block-cipher-based authenticated encryption mode with a provable birthday-bound ...
© Springer International Publishing Switzerland 2016. iFeed is a blockcipher-based authenticated en...
MORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR competition, ...
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidential...
Authenticated encryption schemes are usually expected to offer confidentiality and authenticity. In ...
Leakage resilience (LR) and misuse resistance (MR) are two important properties for the deployment o...
iFeed is a blockcipher-based authenticated encryption design by Zhang, Wu, Sui, and Wang and a first...
The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much ...
The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much ...
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as...
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as...
Authenticated ciphers rely on the uniqueness of the nonces to meet their security goals. In this wor...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
International audienceAuthenticated encryption (AE) schemes are widely used to secure communications...
We propose definitions and constructions of authenticated encryption (AE) schemes that offer securit...
Abstract. COPA is a block-cipher-based authenticated encryption mode with a provable birthday-bound ...
© Springer International Publishing Switzerland 2016. iFeed is a blockcipher-based authenticated en...
MORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR competition, ...
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidential...
Authenticated encryption schemes are usually expected to offer confidentiality and authenticity. In ...
Leakage resilience (LR) and misuse resistance (MR) are two important properties for the deployment o...
iFeed is a blockcipher-based authenticated encryption design by Zhang, Wu, Sui, and Wang and a first...