Blockwise-Adaptive Attackers - Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC (2002)

by Antoine Joux , Gwenaëlle Martinet , Frederic Valette
Venue:In Proceedings of Advances in Cryptology - Crypto 2002, LNCS 2442
Citations:14 - 1 self

Active Bibliography

25 A provable-security treatment of the key-wrap problem – Phillip Rogaway, Thomas Shrimpton - 2006
New Blockcipher Modes of Operation with – Beyond The Birthday, Tetsu Iwata - 2006
22 Authenticated encryption in SSH: Provably fixing the SSH Binary Packet Protocol. Cryptology ePrint Archive, Report 2002/078 – Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre - 2002
31 CWC: A high-performance conventional authenticated encryption mode – Tadayoshi Kohno, John Viega, Doug Whiting - 2004
9 Practical symmetric on-line encryption – Pierre-alain Fouque, Gwenaëlle Martinet, Guillaume Poupard - 2003
3 Duplexing the sponge: Single-pass authenticated encryption and other applications – Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
10 Concealment and its applications to authenticated encryption – Yevgeniy Dodis, Jee Hea An - 2003
222 Authenticated encryption: Relations among notions and analysis of the generic composition paradigm – Mihir Bellare, Chanathip Namprempre - 2000
19 Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm – Mihir Bellare - 2004
13 Stateful public-key cryptosystems: How to encrypt with one 160-bit exponentiation – Mihir Bellare, Tadayoshi Kohno, Victor Shoup - 2006
This is the full Authenticated and Misuse-Resistant Encryption of Key-Dependent Data – Mihir Bellare, Sriram Keelveedhi
The Associated-Data Problem (How to cheaply authenticate unencrypted data when using an authenticated-encryption scheme) – Phillip Rogaway - 2001
7 On the Role of Definitions in and Beyond Cryptography – Phillip Rogaway - 2004
2 On the Security of the CCM Encryption Mode and of a Slight Variant – Pierre-alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sébastien Zimmer
SLC: Efficient Authenticated Encryption for Short Packets – Ammar Alkassar, Elena Andreeva, Helger Lipmaa - 2006
38 The Security and Performance of the Galois/Counter Mode (GCM) of Operation – David A. McGrew, John Viega - 2004
33 Authenticated-encryption with associated-data – Phillip Rogaway - 2002
6 New methods in hard disk encryption – Clemens Fruhwirth - 2005
Keywords: Cipher Block Chaining, Adaptive Chosen Plaintext Attack, Input-Output Masked CBC – Chuan-wen Loe, Khoongming Khoo