Sciweavers

8 search results - page 1 / 2
» Authenticated Encryption Mode for Beyond the Birthday Bound ...
Sort
View
101
Voted
AFRICACRYPT
2008
Springer
15 years 10 months ago
Authenticated Encryption Mode for Beyond the Birthday Bound Security
Tetsu Iwata
117
Voted
FSE
2006
Springer
132views Cryptology» more  FSE 2006»
15 years 7 months ago
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
In this paper, we define and analyze a new blockcipher mode of operation for encryption, CENC, which stands for Cipher-based ENCryption. CENC has the following advantages: (1) bey...
Tetsu Iwata
127
Voted
ACNS
2008
Springer
143views Cryptology» more  ACNS 2008»
15 years 10 months ago
On the Security of the CCM Encryption Mode and of a Slight Variant
In this paper, we present an analysis of the CCM mode of operations and of a slight variant. CCM is a simple and efficient encryption scheme which combines a CBC-MAC authentication...
Pierre-Alain Fouque, Gwenaëlle Martinet, Fr&e...
120
Voted
DAGSTUHL
2007
15 years 5 months ago
Tightness of the Security Bound of CENC
CENC (Cipher-based ENCryption) is the recently designed encryption mode for blockciphers. It is provably secure with beyond the birthday bound. In this note, we present a simple di...
Tetsu Iwata
129
Voted
TIT
2010
121views Education» more  TIT 2010»
14 years 10 months ago
Power of a public random permutation and its application to authenticated encryption
In this paper, we first show that many independent pseudorandom permutations over {0, 1}n can be obtained from a single public random permutation and secret n bits. We next prove ...
Kaoru Kurosawa