The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES
Abstract
References
Index Terms
- The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES
Recommendations
The Exact Multi-user Security of 2-Key Triple DES
Topics in Cryptology – CT-RSA 2024AbstractWe study the tight multi-user (mu) security of 2-key triple encryption (2kTE) with its application to 2-key TDES. With an n-bit block and k-bit key primitive block cipher, our new mu lower bound regarding the number of primitive queries is
The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single Permutation
Advances in Cryptology – EUROCRYPT 2024AbstractWe prove the tight multi-user (mu) security of the (tweakable) key alternating cipher (KAC) for any round r with a single permutation and r-wise independent subkeys, providing a more realistic provable-security foundation for block ciphers. After ...
Multi-user Security of the Elephant v2 Authenticated Encryption Mode
Selected Areas in CryptographyAbstractOne of the finalists in the NIST Lightweight Cryptography competition is v2, a parallelizable, permutation-based authenticated encryption scheme. The original first/second-round submission v1/v1.1 was proven secure against nonce-...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Heng Yin,
- Angelos Stavrou,
- Program Chairs:
- Cas Cremers,
- Elaine Shi
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 663Total Downloads
- Downloads (Last 12 months)232
- Downloads (Last 6 weeks)47
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in