Better bounds for block cipher modes of operation via nonce-based key derivation

S Gueron, Y Lindell - Proceedings of the 2017 ACM SIGSAC Conference …, 2017 - dl.acm.org
Block cipher modes of operation provide a way to securely encrypt using a block cipher. The
main factors in analyzing modes of operation are the level of security achieved (chosen …

A Simple Variant of the Merkle–Damgård Scheme with a Permutation

S Hirose, JH Park, A Yun - Journal of cryptology, 2012 - Springer
We propose a new composition scheme for hash functions. It is a variant of the Merkle–
Damgård construction with a permutation applied right before the processing of the last …

Security of cyclic double block length hash functions including Abreast-DM

E Fleischmann, M Gorski, S Lucks - Cryptology ePrint Archive, 2009 - eprint.iacr.org
We provide the first proof of security for Abreast-DM, one of the oldest and most well-known
constructions for turning a block cipher with $ n $-bit block length and $2 n $-bit key length …

The Multi-user Security of MACs via Universal Hashing in the Ideal Cipher Model

Y Naito - Cryptographers' Track at the RSA Conference, 2024 - Springer
The security of block-cipher-based hash-then-encrypt-type message authentication codes
(MACs) has been proven with universal hash functions. Thus, the security of the underlying …

A simple variant of the Merkle-Damgård scheme with a permutation

S Hirose, JH Park, A Yun - International Conference on the Theory and …, 2007 - Springer
We propose a new composition scheme for hash functions. It is a variant of the Merkle-
Damgård construction with a permutation applied right before the processing of the last …

Tweakable block ciphers

M Liskov, RL Rivest, D Wagner - Journal of cryptology, 2011 - Springer
A common trend in applications of block ciphers over the past decades has been to employ
block ciphers as one piece of a “mode of operation”—possibly, a way to make a secure …

Lightweight MACs from universal hash functions

S Duval, G Leurent - International Conference on Smart Card Research …, 2019 - Springer
Lightweight cryptography is a topic of growing importance, with the goal to secure the
communication of low-end devices that are not powerful enough to use conventional …

Security amplification for the composition of block ciphers: simpler proofs and new results

B Cogliati, J Patarin, Y Seurin - International Conference on Selected …, 2014 - Springer
Security amplification results for block ciphers typically state that cascading (ie, composing
with independent keys) two (or more) block ciphers yields a new block cipher that offers …

Efficient leakage-resilient macs without idealized assumptions

F Berti, C Guo, T Peters, FX Standaert - … on the Theory and Application of …, 2021 - Springer
The security proofs of leakage-resilient MACs based on symmetric building blocks currently
rely on idealized assumptions that hardly translate into interpretable guidelines for the …

Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers

A Röck, K Nyberg - Designs, codes and cryptography, 2013 - Springer
We consider linear approximations of an iterated block cipher in the presence of several
strong linear approximation trails. While the effect of such trails in Matsui's Algorithm 2, also …