2015
DOI: 10.1007/978-3-319-16715-2_19
|View full text |Cite
|
Sign up to set email alerts
|

How to Incorporate Associated Data in Sponge-Based Authenticated Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(15 citation statements)
references
References 10 publications
0
15
0
Order By: Relevance
“…AD denotes data that is authenticated, but not encrypted. It has been shown by Mennink et al [35] as well as Sasaki and Yasuda [38] that it is secure to absorb AD into the capacity of a keyed sponge. Considering that the construction in Figure 6 is a keyed full-state duplex sponge construction, it is therefore secure to inject the patch values into the capacity.…”
Section: Constructionsmentioning
confidence: 98%
“…AD denotes data that is authenticated, but not encrypted. It has been shown by Mennink et al [35] as well as Sasaki and Yasuda [38] that it is secure to absorb AD into the capacity of a keyed sponge. Considering that the construction in Figure 6 is a keyed full-state duplex sponge construction, it is therefore secure to inject the patch values into the capacity.…”
Section: Constructionsmentioning
confidence: 98%
“…From a more general perspective, the work has triggered analysis in the direction of high-efficiency full-state keyed Duplexes [31,60,89]. The result of Mennink et al [60] on the full-state keyed Duplex has triggered the designers of Keyak to perform a major revision to their scheme.…”
Section: Publication History and Subsequent Workmentioning
confidence: 99%
“…The recent line of research on improving bounds of spongeinspired authenticated encryption schemes, set by Jovanovic et al [35], Sasaki and Yasuda [46], and Reyhanitabar et al [44], can be seen as an analysis of a specific use case of the keyed duplex. The Full-State SpongeWrap [38], an authenticated encryption scheme designed from the full-state keyed duplex, improves over these results.…”
Section: Introductionmentioning
confidence: 99%