[PDF][PDF] Sundae-gift

S Banik, A Bogdanov, T Peyrin, Y Sasaki, SM Sim… - Submission to …, 2019 - lab.las3.de
Lightweight block cipher design is one of the most mature research areas, with constructions
going back to 2007, optimizing for a variety of efficiency goals such as latency [11], area [15] …

New generic attacks against hash-based MACs

G Leurent, T Peyrin, L Wang - … 2013: 19th International Conference on the …, 2013 - Springer
In this paper we study the security of hash-based MAC algorithms (such as HMAC and
NMAC) above the birthday bound. Up to the birthday bound, HMAC and NMAC are proven …

The exact security of PMAC

P Gaži, K Pietrzak, M Rybár - IACR Transactions on Symmetric …, 2016 - tosc.iacr.org
PMAC is a simple and parallel block-cipher mode of operation, which was introduced by
Black and Rogaway at Eurocrypt 2002. If instantiated with a (pseudo) random permutation …

Higher-order masking and shuffling for software implementations of block ciphers

M Rivain, E Prouff, J Doget - International Workshop on Cryptographic …, 2009 - Springer
Abstract Differential Power Analysis (DPA) is a powerful side channel key recovery attack
that efficiently breaks block ciphers implementations. In software, two main techniques are …

The subterranean 2.0 cipher suite

J Daemen, PMC Massolino, A Mehrdad… - IACR Transactions on …, 2020 - tosc.iacr.org
This paper presents the Subterranean 2.0 cipher suite that can be used for hashing, MAC
computation, stream encryption and several types of authenticated encryption schemes. At …

[PDF][PDF] A Suggestion for handling Arbitrary-Length Messages with the CBC MAC

J Black, P Rogaway - NIST Second Modes of Operation Workshop …, 2001 - cs.colorado.edu
The CBC MAC is the customary way to make a message authentication code (MAC) from a
block cipher. It is the subject of several standards, including [1, 5, 6]. It is well-known and …

Fast and secure CBC-type MAC algorithms

M Nandi - International Workshop on Fast Software Encryption, 2009 - Springer
The CBC− MAC or cipher block chaining message authentication code, is a well-known
method to generate message authentication codes. Unfortunately, it is not forgery-secure …

Encryption modes with almost free message integrity

CS Jutla - International conference on the theory and applications …, 2001 - Springer
We define a new mode of operation for block encryption which in addition to assuring
confidentiality also assures message integrity. In contrast, previously for message integrity a …

PRINCE-a low-latency block cipher for pervasive computing applications (full version)

J Borghoff, A Canteaut, T Güneysu, EB Kavun… - Cryptology ePrint …, 2012 - eprint.iacr.org
This paper presents a block cipher that is optimized with respect to latency when
implemented in hardware. Such ciphers are desirable for many future pervasive applications …

The sum of CBC MACs is a secure PRF

K Yasuda - Topics in Cryptology-CT-RSA 2010: The …, 2010 - Springer
We present a new message authentication code (MAC) based on block ciphers. Our new
MAC algorithm, though twice as slow as an ordinary CBC MAC, can be proven to be a …