2021
DOI: 10.1007/978-3-030-92548-2_3
|View full text |Cite
|
Sign up to set email alerts
|

Partition Oracles from Weak Key Forgeries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…In practice, a subversion with negligible detection probability, say 2 −128 , should be considered undetectable. 2 As DFP note, decryption failures may happen for reasons other than a subverted encryption algorithm, and if they occur sporadically may easily go unnoticed. Thus, a subverted encryption scheme that exhibits decryption failure with a very low probability is a good candidate for a practical ASA that is hard to detect.…”
Section: Symmetric Encryptionmentioning
confidence: 99%
See 2 more Smart Citations
“…In practice, a subversion with negligible detection probability, say 2 −128 , should be considered undetectable. 2 As DFP note, decryption failures may happen for reasons other than a subverted encryption algorithm, and if they occur sporadically may easily go unnoticed. Thus, a subverted encryption scheme that exhibits decryption failure with a very low probability is a good candidate for a practical ASA that is hard to detect.…”
Section: Symmetric Encryptionmentioning
confidence: 99%
“…We emphasise that our results reach far beyond this: our subversion attacks are generic (rather than being focused on one specific MAC) and we do not require exotic technical conditions like randomised tag generation. 3…”
Section: Macsmentioning
confidence: 99%
See 1 more Smart Citation