Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields

C Dobraunig, L Grassi, A Guinet, D Kuijsters - … International Conference on …, 2021 - Springer
Motivated by new applications such as secure Multi-Party Computation (MPC), Fully
Homomorphic Encryption (FHE), and Zero-Knowledge proofs (ZK), the need for symmetric …

General classification of the authenticated encryption schemes for the CAESAR competition

F Abed, C Forler, S Lucks - Computer Science Review, 2016 - Elsevier
An authenticated encryption scheme is a scheme which provides privacy and integrity by
using a secret key. In 2013, CAESAR (the “Competition for Authenticated Encryption …

Parallelizable and authenticated online ciphers

E Andreeva, A Bogdanov, A Luykx, B Mennink… - Advances in Cryptology …, 2013 - Springer
Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks
which only depend on the preceding plaintext blocks. All online ciphers proposed so far are …

EWCDM: an efficient, beyond-birthday secure, nonce-misuse resistant MAC

B Cogliati, Y Seurin - Annual International Cryptology Conference, 2016 - Springer
We propose a nonce-based MAC construction called EWCDM (Encrypted Wegman-Carter
with Davies-Meyer), based on an almost xor-universal hash function and a block cipher, with …

ZMAC: a fast tweakable block cipher mode for highly secure message authentication

T Iwata, K Minematsu, T Peyrin, Y Seurin - Annual international cryptology …, 2017 - Springer
We propose a new mode of operation called ZMAC allowing to construct a (stateless and
deterministic) message authentication code (MAC) from a tweakable block cipher (TBC) …

The security of ChaCha20-Poly1305 in the multi-user setting

JP Degabriele, J Govinden, F Günther… - Proceedings of the 2021 …, 2021 - dl.acm.org
The ChaCha20-Poly1305 AEAD scheme is being increasingly widely deployed in practice.
Practitioners need proven security bounds in order to set data limits and rekeying intervals …

Analyzing multi-key security degradation

A Luykx, B Mennink, KG Paterson - … on the Theory and Applications of …, 2017 - Springer
The multi-key, or multi-user, setting challenges cryptographic algorithms to maintain high
levels of security when used with many different keys, by many different users. Its …

Pipelineable on-line encryption

F Abed, S Fluhrer, C Forler, E List, S Lucks… - … Workshop on Fast …, 2014 - Springer
Correct authenticated decryption requires the receiver to buffer the decrypted message until
the authenticity check has been performed. In high-speed networks, which must handle …

Side-Channel Analysis of Multiplications in GF(2128) Application to AES-GCM

S Belaïd, PA Fouque, B Gérard - … on the Theory and Application of …, 2014 - Springer
In this paper, we study the side-channel security of the field multiplication in GF (2 n). We
particularly focus on GF (2 128) multiplication which is the one used in the authentication …

Masking the lightweight authenticated ciphers acorn and ascon in software

A Adomnicai, JJA Fournier, L Masson - Cryptology ePrint Archive, 2018 - eprint.iacr.org
The ongoing CAESAR competition aims at finding authenticated encryption schemes that
offer advantages over AES-GCM for several use-cases, including lightweight applications …