2015
DOI: 10.1007/978-3-662-46800-5_29
|View full text |Cite
|
Sign up to set email alerts
|

Twisted Polynomials and Forgery Attacks on GCM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…AES-OGCM-1 and AES-OGCM-2 can encrypt at most 2 96 plaintexts in the nonce-respecting scenario, the maximum length of the plaintext is about 2 32 blocks (64 GBytes), and the privacy and authenticity achieve roughly 107.9565-bit or 121.9339-bit security which is better than those of AES-GCM (about 64-bit security). Alike GCM, OGCM-1 and OGCM-2 are based on polynomial AXU hash functions which may introduce some attacks, such as [36,37,42,43].…”
Section: Discussion and Future Workmentioning
confidence: 99%
See 1 more Smart Citation
“…AES-OGCM-1 and AES-OGCM-2 can encrypt at most 2 96 plaintexts in the nonce-respecting scenario, the maximum length of the plaintext is about 2 32 blocks (64 GBytes), and the privacy and authenticity achieve roughly 107.9565-bit or 121.9339-bit security which is better than those of AES-GCM (about 64-bit security). Alike GCM, OGCM-1 and OGCM-2 are based on polynomial AXU hash functions which may introduce some attacks, such as [36,37,42,43].…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…For the attacks of GCM, Saarinen showed weak keys of GHASH and the cycling attacks on GCM in [36]. Other researches related to GCM include [37][38][39][40][41][42][43][44]. GCM has been widely applied in the IEEE 802.1AE Ethernet security, IEEE 802.11ad, IETF IPsec standards, SSH, TLS, and so on.…”
Section: Introductionmentioning
confidence: 99%