SCIENCE CHINA Information Sciences, Volume 61 , Issue 9 : 098104(2018) https://doi.org/10.1007/s11432-017-9253-9

Efficient beyond-birthday-bound secure authenticated encryption modes

More info
  • ReceivedJun 9, 2017
  • AcceptedSep 20, 2017
  • PublishedApr 23, 2018


There is no abstract available for this article.


This work was supported by National Natural Science Foundation of China (Grant Nos. 61522210, 61632013).


Appendixes A–F.


[1] Iwata T, Minematsu K. Stronger security variants of GCM-SIV. IACR Trans Symmetric Cryptol, 2016, 2016: 134--157. Google Scholar

[2] Peyrin T, Seurin Y. Counter-in-tweak: authenticated encryption modes for tweakable block ciphers. In: Proceedings of the 36th Annual International Cryptology Conference, Santa Barbara, 2016. 33--63. Google Scholar

[3] List E, Nandi M. Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption. In: Proceedings of the Cryptographer's Track at the RSA Conference, San Francisco, 2017. 258--274. Google Scholar

[4] Jovanvic P, Luykx A, Mennink B. Beyond $2^{c/2}$ security in sponge-based authenticated encryption modes. In: Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, 2014. 85--104. Google Scholar

[5] Minematsu K. How to thwart birthday attacks against MACs via small randomness. In: Proceedings of the 17th International Workshop on Fast Software Encryption, Seoul, 2010. 230--249. Google Scholar

[6] Iwata T, Yasuda K. BTM: a single-key, inverse-cipher-free mode for deterministic authenticated encryption. In: Proceedings of the 16th Annual International Workshop on Selected Areas in Cryptography, Calgary, 2009. 313--330. Google Scholar