Skip to main content
Log in

Efficient beyond-birthday-bound secure authenticated encryption modes

  • Highlight
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Iwata T, Minematsu K. Stronger security variants of GCM-SIV. IACR Trans Symmetric Cryptol, 2016, 2016: 134–157

    Google Scholar 

  2. Peyrin T, Seurin Y. Counter-in-tweak: authenticated encryption modes for tweakable block ciphers. In: Proceedings of the 36th Annual International Cryptology Conference, Santa Barbara, 2016. 33–63

    Google Scholar 

  3. List E, Nandi M. Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption. In: Proceedings of the Cryptographer’s Track at the RSA Conference, San Francisco, 2017. 258–274

    Google Scholar 

  4. Jovanvic P, Luykx A, Mennink B. Beyond 2c/2 security in sponge-based authenticated encryption modes. In: Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, 2014. 85–104

    Google Scholar 

  5. Minematsu K. How to thwart birthday attacks against MACs via small randomness. In: Proceedings of the 17th International Workshop on Fast Software Encryption, Seoul, 2010. 230–249

    Chapter  Google Scholar 

  6. Iwata T, Yasuda K. BTM: a single-key, inverse-cipherfree mode for deterministic authenticated encryption. In: Proceedings of the 16th Annual International Workshop on Selected Areas in Cryptography, Calgary, 2009. 313–330

    Chapter  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61522210, 61632013).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Honggang Hu.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, P., Hu, H. & Wang, P. Efficient beyond-birthday-bound secure authenticated encryption modes. Sci. China Inf. Sci. 61, 098104 (2018). https://doi.org/10.1007/s11432-017-9253-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-017-9253-9