2016
DOI: 10.1007/978-3-662-53887-6_15
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated Encryption with Variable Stretch

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
29
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 14 publications
(30 citation statements)
references
References 21 publications
1
29
0
Order By: Relevance
“…However, other robust security properties, such as security with variable-length tags [63], under distinguishable decryption failures [19], or under release of unverified plaintext [3] are equally desirable. The CAESAR competition's use case describing defense in depth lists authenticity and limited confidentiality damage from release of unverified plaintexts (RUP) as desirable properties [15].…”
Section: Release Of Unverified Plaintextmentioning
confidence: 99%
“…However, other robust security properties, such as security with variable-length tags [63], under distinguishable decryption failures [19], or under release of unverified plaintext [3] are equally desirable. The CAESAR competition's use case describing defense in depth lists authenticity and limited confidentiality damage from release of unverified plaintexts (RUP) as desirable properties [15].…”
Section: Release Of Unverified Plaintextmentioning
confidence: 99%
“…To clarify what is meant by "flexible" security-overhead trade-off, consider for example a nonce-based AEAD algorithm that is secure to use with variable stretch [RVV16]; that is, under the same key, several tag lengths (a.k.a. ciphertext expansion or stretch) can be securely used for authenticated encryption of different messages.…”
Section: Variable Stretchmentioning
confidence: 99%
“…The support of variable tag length in AEAD schemes has been investigated by Reyhanitabar, Vaudenay and Vizár [RVV16] from both a misuse-resistance viewpoint and optimizing computation and communication overheads in resource-constrained devices. The work formalizes the security of nonce-based AEAD schemes with variable stretch in the security notion nvae (for nonce-based variable-stretch AE), establishes relations with existing notions, and proposes how to achieve and prove nvae security with the help of the so-called kess property (for key-equivalent separation by stretch).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This new type of misuse has been identified by the community only recently. Some of the second-round candidates have already included heuristic measures against it and the first formal treatment for nonce-based AE schemes was proposed by R e y h a n i t a b a r et al [62].…”
Section: Security Goals Of Aementioning
confidence: 99%