Efficient schemes for committing authenticated encryption

M Bellare, VT Hoang - Annual International Conference on the Theory and …, 2022 - Springer
This paper provides efficient authenticated-encryption (AE) schemes in which a ciphertext is
a commitment to the key. These are extended, at minimal additional cost, to schemes where …

The multi-user security of authenticated encryption: AES-GCM in TLS 1.3

M Bellare, B Tackmann - Advances in Cryptology–CRYPTO 2016: 36th …, 2016 - Springer
We initiate the study of multi-user (mu) security of authenticated encryption (AE) schemes as
a way to rigorously formulate, and answer, questions about the “randomized nonce” …

Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds

P Bose, VT Hoang, S Tessaro - … on the Theory and Applications of …, 2018 - Springer
This paper revisits the multi-user (mu) security of symmetric encryption, from the perspective
of delivering an analysis of the AES-GCM-SIV AEAD scheme. Our end result shows that its …

Block cipher invariants as eigenvectors of correlation matrices

T Beyne - Journal of Cryptology, 2020 - Springer
A new approach to invariant subspaces and nonlinear invariants is developed. This results
in both theoretical insights and practical attacks on block ciphers. It is shown that, with minor …

Critical perspectives on provable security: Fifteen years of" another look" papers

N Koblitz, A Menezes - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Contents Page 1 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …

The security of ChaCha20-Poly1305 in the multi-user setting

JP Degabriele, J Govinden, F Günther… - Proceedings of the 2021 …, 2021 - dl.acm.org
The ChaCha20-Poly1305 AEAD scheme is being increasingly widely deployed in practice.
Practitioners need proven security bounds in order to set data limits and rekeying intervals …

Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme

R Ueno, N Homma, A Inoue… - IACR Transactions on …, 2024 - tches.iacr.org
This paper presents a provably secure, higher-order, and leakage-resilient (LR) rekeying
scheme named LR Rekeying with Random oracle Repetition (LR4), along with a …

Nonces are noticed: AEAD revisited

M Bellare, R Ng, B Tackmann - … in Cryptology–CRYPTO 2019: 39th Annual …, 2019 - Springer
We draw attention to a gap between theory and usage of nonce-based symmetric
encryption, under which the way the former treats nonces can result in violation of privacy in …

When messages are keys: Is HMAC a dual-PRF?

M Backendal, M Bellare, F Günther… - Annual International …, 2023 - Springer
In Internet security protocols including TLS 1.3, KEMTLS, MLS and Noise, HMAC is being
assumed to be a dual-PRF, meaning a PRF not only when keyed conventionally (through its …

The multi-user security of GCM, revisited: tight bounds for nonce randomization

VT Hoang, S Tessaro, A Thiruvengadam - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Multi-user (mu) security considers large-scale attackers (eg, state actors) that given access
to a number of sessions, attempt to compromise at least one of them. Mu security of …