2004
DOI: 10.1007/978-3-540-27800-9_38
|View full text |Cite
|
Sign up to set email alerts
|

ManTiCore: Encryption with Joint Cipher-State Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2004
2004
2019
2019

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…It also allows for a scheme that does not need the inverse of the block cipher in decryption. In order to achieve integrity of COBRA, we utilize the checksum of intermediate state values of the Feistel structure, which is similar to a technique proposed by Anderson et al in their ManTiCore design [1].…”
Section: Introductionmentioning
confidence: 99%
“…It also allows for a scheme that does not need the inverse of the block cipher in decryption. In order to achieve integrity of COBRA, we utilize the checksum of intermediate state values of the Feistel structure, which is similar to a technique proposed by Anderson et al in their ManTiCore design [1].…”
Section: Introductionmentioning
confidence: 99%
“…Related work. An AE design which bears similarities with our forkcipher idea is Manticore [8] (the CS scheme). They use the middle state of a block cipher to evaluate a polynomial hash function for authentication purposes.…”
Section: Contributionmentioning
confidence: 99%
“…Yet, the fundamental difference with our design is that we use a different framework (TWEAKEY [37]) which considers the nonce and key together and injects a transformation of those throughout the forkcipher rounds. Moreover, it seems impossible to describe the latter designs ( [8], [14]) as neither primitives nor modes with clearly defined security goals, whereas our approach aims the opposite.…”
Section: Contributionmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, given the landscape of cryptographic algorithms, we have chosen to not pursue patents on these new algorithms so as not to contribute to the current patent minefield. This report covers a superset of our work that was published in [1].…”
Section: Contents 1 Introductionmentioning
confidence: 95%