iFeed is a blockcipher-based authenticated encryption design by Zhang, Wu, Sui, and Wang and a first round candidate to the CAESAR competition. iFeed is claimed to achieve confidentiality and authenticity in the nonce-respecting setting, and confidentiality in the nonce-reuse setting. Recently, Chakraborti et al. published forgeries on iFeed in the RUP and nonce-reuse settings. The latter attacks, however, do not invalidate the iFeed designers’ security claims. In this work, we consider the security of iFeed in the nonce-respecting setting, and show that a valid forgery can be constructed after only one encryption query. Even more, the forgery leaks both subkeys EK(0128) and EK(PMN∥1), where K is the secret key and PMN the nonce used for th...
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as...
Abstract. We present a forgery attack on Prøst-OTR in a related-key setting. Prøst is a family of au...
In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook...
© Springer International Publishing Switzerland 2016. iFeed is a blockcipher-based authenticated en...
Authenticated ciphers rely on the uniqueness of the nonces to meet their security goals. In this wor...
Abstract. In this article, we analyse the security of the authenticated encryption mode JAMBU, a sub...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
In this paper, we analyse a block cipher mode of operation submitted in 2014 to the cryptographic co...
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as...
Abstract. In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offse...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
Abstract. In FSE 2014, an authenticated encryption mode COBRA [4], based on pseudorandom per-mutatio...
Free to read on publisher website We investigate six authenticated encryption schemes (ACORN, ASCON-...
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as...
Abstract. We present a forgery attack on Prøst-OTR in a related-key setting. Prøst is a family of au...
In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook...
© Springer International Publishing Switzerland 2016. iFeed is a blockcipher-based authenticated en...
Authenticated ciphers rely on the uniqueness of the nonces to meet their security goals. In this wor...
Abstract. In this article, we analyse the security of the authenticated encryption mode JAMBU, a sub...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
In this paper, we analyse a block cipher mode of operation submitted in 2014 to the cryptographic co...
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as...
Abstract. In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offse...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
Abstract. In FSE 2014, an authenticated encryption mode COBRA [4], based on pseudorandom per-mutatio...
Free to read on publisher website We investigate six authenticated encryption schemes (ACORN, ASCON-...
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as...
Abstract. We present a forgery attack on Prøst-OTR in a related-key setting. Prøst is a family of au...
In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook...