메뉴 건너뛰기




Volumn 7118 LNCS, Issue , 2012, Pages 320-337

Duplexing the sponge: Single-pass authenticated encryption and other applications

Author keywords

authenticated encryption; duplex construction; Keccak; key wrapping; provable security; pseudo random bit sequence generator; sponge functions

Indexed keywords

AUTHENTICATED ENCRYPTION; BLOCK CIPHERS; DUPLEXING; KECCAK; NOVEL CONSTRUCTION; OTHER APPLICATIONS; PROVABLE SECURITY; PSEUDO-RANDOM BIT SEQUENCE GENERATORS; SINGLE STAGE;

EID: 84857722910     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-28496-0_19     Document Type: Conference Paper
Times cited : (237)

References (33)
  • 2
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
    • Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
    • Bellare, M., Namprempre, C.: Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 4
    • 18844420431 scopus 로고    scopus 로고
    • Forward-security in private-key cryptography
    • ePrint Archive, Report 2001/035
    • Bellare, M., Yee, B.: Forward-security in private-key cryptography. Cryptology ePrint Archive, Report 2001/035 (2001), http://eprint.iacr.org/
    • (2001) Cryptology
    • Bellare, M.1    Yee, B.2
  • 6
    • 44449147491 scopus 로고    scopus 로고
    • On the Indifferentiability of the Sponge Construction
    • Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
    • Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: On the Indifferentiability of the Sponge Construction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 181-197. Springer, Heidelberg (2008), http://sponge.noekeon.org/
    • (2008) LNCS , vol.4965 , pp. 181-197
    • Bertoni, G.1    Daemen, J.2    Peeters, M.3    Van Assche, G.4
  • 7
    • 78049328962 scopus 로고    scopus 로고
    • Sponge-based pseudorandom number generators
    • Mangard and Standaert
    • Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge-based pseudorandom number generators. In: Mangard and Standaert [20], pp. 33-47
    • LNCS , pp. 33-47
    • Bertoni, G.1    Daemen, J.2    Peeters, M.3    Van Assche, G.4
  • 8
    • 84857764721 scopus 로고    scopus 로고
    • Duplexing the sponge: Singlepass authenticated encryption and other applications
    • ePrint Archive, Report 2011/499
    • Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the sponge: singlepass authenticated encryption and other applications. Cryptology ePrint Archive, Report 2011/499 (2011), http://eprint.iacr.org/
    • (2011) Cryptology
    • Bertoni, G.1    Daemen, J.2    Peeters, M.3    Van Assche, G.4
  • 11
    • 77954728697 scopus 로고    scopus 로고
    • FSE 2007. Springer, Heidelberg
    • Biryukov, A. (ed.): FSE 2007. LNCS, vol. 4593. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4593
    • Biryukov, A.1
  • 12
    • 80053502266 scopus 로고    scopus 로고
    • Spongent: A Lightweight Hash Function
    • Preneel, B., Takagi, T. (eds.) CHES 2011. Springer, Heidelberg
    • Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varici, K., Verbauwhede, I.: spongent: A Lightweight Hash Function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 312-325. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6917 , pp. 312-325
    • Bogdanov, A.1    Knežević, M.2    Leander, G.3    Toz, D.4    Varici, K.5    Verbauwhede, I.6
  • 13
    • 84947295950 scopus 로고    scopus 로고
    • A Practice-Oriented Treatment of Pseudorandom Number Generators
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Desai, A., Hevia, A., Yin, Y.L.: A Practice-Oriented Treatment of Pseudorandom Number Generators. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 368-383. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 368-383
    • Desai, A.1    Hevia, A.2    Yin, Y.L.3
  • 14
    • 84855360210 scopus 로고    scopus 로고
    • Request for review of key wrap algorithms
    • ePrint Archive, Report 2004/340
    • Dworkin, M.: Request for review of key wrap algorithms. Cryptology ePrint Archive, Report 2004/340 (2004), http://eprint.iacr.org/
    • (2004) Cryptology
    • Dworkin, M.1
  • 15
    • 84889706985 scopus 로고    scopus 로고
    • ECRYPT Network of excellence
    • ECRYPT Network of excellence, The SHA-3 Zoo (2011), http://ehash.iaik. tugraz.at/index.php/The-SHA-3-Zoo
    • (2011) The SHA-3 Zoo
  • 16
    • 0242571721 scopus 로고    scopus 로고
    • Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive
    • Johansson, T. (ed.) FSE 2003. Springer, Heidelberg
    • Ferguson, N.,Whiting, D., Schneier, B., Kelsey, J., Lucks, S., Kohno, T.: Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 330-346. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2887 , pp. 330-346
    • Ferguson, N.1    Whiting, D.2    Schneier, B.3    Kelsey, J.4    Lucks, S.5    Kohno, T.6
  • 17
    • 58349093205 scopus 로고    scopus 로고
    • Slide Attacks on a Class of Hash Functions
    • Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
    • Gorski, M., Lucks, S., Peyrin, T.: Slide Attacks on a Class of Hash Functions. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 143-160. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5350 , pp. 143-160
    • Gorski, M.1    Lucks, S.2    Peyrin, T.3
  • 18
    • 80051991385 scopus 로고    scopus 로고
    • The PHOTON Family of Lightweight Hash Functions
    • Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
    • Guo, J., Peyrin, T., Poschmann, A.: The PHOTON Family of Lightweight Hash Functions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 222-239. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6841 , pp. 222-239
    • Guo, J.1    Peyrin, T.2    Poschmann, A.3
  • 19
    • 38149002857 scopus 로고    scopus 로고
    • The Grindahl hash functions
    • Biryukov
    • Knudsen, L., Rechberger, C., Thomsen, S.: The Grindahl hash functions. In: Biryukov [11], pp. 39-57
    • LNCS , pp. 39-57
    • Knudsen, L.1    Rechberger, C.2    Thomsen, S.3
  • 20
    • 79960079027 scopus 로고    scopus 로고
    • CHES 2010. Springer, Heidelberg
    • Mangard, S., Standaert, F.-X. (eds.): CHES 2010. LNCS, vol. 6225. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6225
    • Mangard, S.1    Standaert, F.-X.2
  • 21
    • 35048817517 scopus 로고    scopus 로고
    • Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology
    • Naor, M. (ed.) TCC 2004. Springer, Heidelberg
    • Maurer, U., Renner, R., Holenstein, C.: Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 21-39. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2951 , pp. 21-39
    • Maurer, U.1    Renner, R.2    Holenstein, C.3
  • 22
    • 26444613466 scopus 로고    scopus 로고
    • Differential attacks against the Helix stream cipher
    • Roy and Meier
    • Muller, F.: Differential attacks against the Helix stream cipher. In: Roy and Meier [30], pp. 94-108
    • LNCS , pp. 94-108
    • Muller, F.1
  • 24
    • 26444511997 scopus 로고    scopus 로고
    • Solving systems of differential equations of addition
    • Information Security and Privacy: 10th Australasian Conference, ACISP 2005. Proceedings
    • Paul, S., Preneel, B.: Solving Systems of Differential Equations of Addition. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 75-88. Springer, Heidelberg (2005) (Pubitemid 41431772)
    • (2005) Lecture Notes in Computer Science , vol.3574 , pp. 75-88
    • Paul, S.1    Preneel, B.2
  • 25
    • 79958012441 scopus 로고    scopus 로고
    • Careful with Composition: Limitations of the Indifferentiability Framework
    • Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
    • Ristenpart, T., Shacham, H., Shrimpton, T.: Careful with Composition: Limitations of the Indifferentiability Framework. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 487-506. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 487-506
    • Ristenpart, T.1    Shacham, H.2    Shrimpton, T.3
  • 27
    • 26444532494 scopus 로고    scopus 로고
    • OCB: A block-cipher mode of operation for efficient authenticated encryption
    • Rogaway, P., Bellare, M., Black, J.: OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Trans. Inf. Syst. Secur. 6(3), 365-403 (2003)
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.3 , pp. 365-403
    • Rogaway, P.1    Bellare, M.2    Black, J.3
  • 30
    • 84857765119 scopus 로고    scopus 로고
    • FSE 2004. Springer, Heidelberg
    • Roy, B., Meier, W. (eds.): FSE 2004. LNCS, vol. 3017. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3017
    • Roy, B.1    Meier, W.2
  • 32
    • 38149123508 scopus 로고    scopus 로고
    • Differential-linear attacks against the stream cipher Phelix
    • Biryukov
    • Wu, H., Preneel, B.: Differential-linear attacks against the stream cipher Phelix. In: Biryukov [11], pp. 87-100
    • LNCS , pp. 87-100
    • Wu, H.1    Preneel, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.