The COLM Authenticated Encryption Scheme (original) (raw)

References

  1. E. Andreeva, A. Bogdanov, N. Datta, A. Luykx, B. Mennink, M. Nandi, E. Tischhauser, K. Yasuda, COLM (2014), submission to CAESAR competition
  2. E. Andreeva, A. Bogdanov, A. Luykx, B. Mennink, N. Mouha, K. Yasuda, How to securely release unverified plaintext in authenticated encryption, in Sarkar, P., Iwata, T. (eds.) Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Lecture Notes in Computer Science, vol. 8873 (Springer, 2014), pp. 105–125. https://doi.org/10.1007/978-3-662-45611-8_6
  3. E. Andreeva, A. Bogdanov, A. Luykx, B. Mennink, E. Tischhauser, K. Yasuda, Parallelizable and authenticated online ciphers, in Sako, K., Sarkar, P. (eds.) Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1–5, 2013, Proceedings, Part I. Lecture Notes in Computer Science, vol. 8269 (Springer, 2013), pp. 424–443. https://doi.org/10.1007/978-3-642-42033-7_22
  4. M. Bellare, A. Boldyreva, L.R. Knudsen, C. Namprempre, Online ciphers and the hash-cbc construction, in Kilian, J. (ed.) Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19–23, 2001, Proceedings. Lecture Notes in Computer Science, vol. 2139 (Springer, 2001), pp. 292–309. https://doi.org/10.1007/3-540-44647-8_18
  5. G. Bertoni, J. Daemen, M. Peeters, G. Van Assche, R. Van Keer, Keyak v1 (2014), submission to CAESAR competition
  6. H. Böck, A. Zauner, S. Devlin, J. Somorovsky, P. Jovanovic, Nonce-disrespecting adversaries: Practical forgery attacks on GCM in TLS, in: Silvanovich, N., Traynor, P. (eds.) 10th USENIX Workshop on Offensive Technologies, WOOT 16, Austin, TX, USA, August 8–9, 2016 (USENIX Association, 2016), https://www.usenix.org/conference/woot16/workshop-program/presentation/bock
  7. CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness (May 2014), http://competitions.cr.yp.to/caesar.html
  8. J. Daemen, V. Rijmen, The Design of Rijndael: AES - The Advanced Encryption Standard. Information Security and Cryptography (Springer, 2002), https://doi.org/10.1007/978-3-662-04722-4
  9. N. Datta, A. Luykx, B. Mennink, M. Nandi, Understanding RUP integrity of COLM. IACR Trans. Symmetric Cryptol. 2017(2), 143–161 (2017), https://doi.org/10.13154/tosc.v2017.i2.143-161
  10. N. Datta, M. Nandi, ELmD v1.0 (2014), submission to CAESAR competition
  11. G. Endignoux, D. Vizár, Linking online misuse-resistant authenticated encryption and blockwise attack models. IACR Trans. Symmetric Cryptol. 2016(2), 125–144 (2016), https://doi.org/10.13154/tosc.v2016.i2.125-144
  12. E. Fleischmann, C. Forler, S. Lucks, McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes, in Canteaut, A. (ed.) Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. Lecture Notes in Computer Science, vol. 7549 (Springer, 2012), pp. 196–215, https://doi.org/10.1007/978-3-642-34047-5_12
  13. S. Halevi, P. Rogaway, A parallelizable enciphering mode. In: Okamoto, T. (ed.) Topics in Cryptology - CT-RSA 2004, The Cryptographers’ Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings. Lecture Notes in Computer Science, vol. 2964 (Springer, 2004), pp. 292–304, https://doi.org/10.1007/978-3-540-24660-2_23
  14. V.T. Hoang, T. Krovetz, P. Rogaway, AEZ (2014), submission to CAESAR competition
  15. J. Jean, I. Nikolić, T. Peyrin, Y. Seurin, Deoxys-II (2014), submission to CAESAR competition
  16. J. Patarin, The "coefficients h" technique, in Avanzi, R.M., Keliher, L., Sica, F. (eds.) Selected Areas in Cryptography, 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers. Lecture Notes in Computer Science, vol. 5381 (Springer, 2008), pp. 328–345, https://doi.org/10.1007/978-3-642-04159-4_21
  17. P. Rogaway, Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC, in Lee, P.J. (ed.) Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings. Lecture Notes in Computer Science, vol. 3329 (Springer, 2004), pp. 16–31, https://doi.org/10.1007/978-3-540-30539-2_2
  18. M. Vanhoef, F. Piessens, Key reinstallation attacks: Forcing nonce reuse in WPA2. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017 (ACM, 2017), pp. 1313–1328, https://doi.org/10.1145/3133956.3134027

Download references