Tweakable blockciphers with beyond birthday-bound security

W Landecker, T Shrimpton, RS Terashima - Annual Cryptology …, 2012 - Springer
Abstract Liskov, Rivest and Wagner formalized the tweakable blockcipher (TBC) primitive at
CRYPTO'02. The typical recipe for instantiating a TBC is to start with a blockcipher, and then …

Efficient leakage-resilient macs without idealized assumptions

F Berti, C Guo, T Peters, FX Standaert - … on the Theory and Application of …, 2021 - Springer
The security proofs of leakage-resilient MACs based on symmetric building blocks currently
rely on idealized assumptions that hardly translate into interpretable guidelines for the …

Strong authenticity with leakage under weak and falsifiable physical assumptions

F Berti, C Guo, O Pereira, T Peters… - … Conference on Information …, 2019 - Springer
Authenticity can be compromised by information leaked via side-channels (eg, power
consumption). Examples of attacks include direct key recoveries and attacks against the tag …

Related-key secure pseudorandom functions: The case of additive attacks

B Applebaum, E Widder - Cryptology ePrint Archive, 2014 - eprint.iacr.org
In a related-key attack (RKA) an adversary attempts to break a cryptographic primitive by
invoking the primitive with several secret keys which satisfy some known relation. The task of …

Hash functions from defective ideal ciphers

J Katz, S Lucks, A Thiruvengadam - Topics in Cryptology–-CT-RSA 2015 …, 2015 - Springer
Cryptographic constructions are often designed and analyzed in idealized frameworks such
as the random-oracle or ideal-cipher models. When the underlying primitives are …

[PDF][PDF] Efficient Leakage-Resilient MACs without Idealized Assumptions

The security proofs of leakage-resilient MACs based on symmetric building blocks currently
rely on idealized assumptions that hardly translate into interpretable guidelines for the …

XKX Does Not Preserve Unpredictability

Y Zou, X Zhang, L Wang - … of the 3rd International Conference on …, 2019 - dl.acm.org
In this paper, the security of the XKX tweakable blockcipher construction is revisited.
Proposed at FSE 2018, the security of the XKX was proved to be a tweakable …

Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions

FX Standaert - Information Security and Cryptology - Springer
Authenticity can be compromised by information leaked via side-channels (eg, power
consumption). Examples of attacks include direct key recoveries and attacks against the tag …

BCBC: a more efficient MAC algorithm

B Liang, W Wu, L Zhang - … , ISPEC 2011, Guangzhou, China, May 30–June …, 2011 - Springer
In this paper, we construct a new MAC algorithm BCBC-MAC from a block cipher and a fixed
function. BCBC-MAC is provably secure under the assumptions that the block cipher is …