References
Iwata T, Minematsu K. Stronger security variants of GCM-SIV. IACR Trans Symmetric Cryptol, 2016, 2016: 134–157
Peyrin T, Seurin Y. Counter-in-tweak: authenticated encryption modes for tweakable block ciphers. In: Proceedings of the 36th Annual International Cryptology Conference, Santa Barbara, 2016. 33–63
List E, Nandi M. Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption. In: Proceedings of the Cryptographer’s Track at the RSA Conference, San Francisco, 2017. 258–274
Jovanvic P, Luykx A, Mennink B. Beyond 2c/2 security in sponge-based authenticated encryption modes. In: Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, 2014. 85–104
Minematsu K. How to thwart birthday attacks against MACs via small randomness. In: Proceedings of the 17th International Workshop on Fast Software Encryption, Seoul, 2010. 230–249
Iwata T, Yasuda K. BTM: a single-key, inverse-cipherfree mode for deterministic authenticated encryption. In: Proceedings of the 16th Annual International Workshop on Selected Areas in Cryptography, Calgary, 2009. 313–330
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant Nos. 61522210, 61632013).
Author information
Authors and Affiliations
Corresponding author
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Zhang, P., Hu, H. & Wang, P. Efficient beyond-birthday-bound secure authenticated encryption modes. Sci. China Inf. Sci. 61, 098104 (2018). https://doi.org/10.1007/s11432-017-9253-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-017-9253-9