2021
DOI: 10.1007/978-3-030-92078-4_14
|View full text |Cite
|
Sign up to set email alerts
|

Toward a Fully Secure Authenticated Encryption Scheme from a Pseudorandom Permutation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…We believe that the techniques have a wide range of applications in the future design of public permutation based schemes. For example, when building nonce-less MAC algorithms and (authenticated) encryption schemes with beyond birthday bound security using public permutations, as done in the case of block cipher-based mirror theory [13,28].…”
Section: Our Contributionmentioning
confidence: 99%
“…We believe that the techniques have a wide range of applications in the future design of public permutation based schemes. For example, when building nonce-less MAC algorithms and (authenticated) encryption schemes with beyond birthday bound security using public permutations, as done in the case of block cipher-based mirror theory [13,28].…”
Section: Our Contributionmentioning
confidence: 99%
“…For a µ-faulty nonce, if µ = 0, it is expected to degenerate to nonce-respecting; if µ ≥ 1, it is nonce-misuse. At ASIACRYPT 2021, Choi et al introduced the faulty nonce to AE, presented a parallelizable nonce-based AE mode SCM, and proved its security with graceful degradation in the faulty nonce security model [15].…”
Section: Introductionmentioning
confidence: 99%