Message Extension Attack against Authenticated Encryptions: Application to PANDA
We present a new cryptanalysis approach to analyze the security of a class of authenticated encryption schemes, which shares similarity with the previous length extension attack against hash-function-based MACs. Hence we name our approach by message extension attack. For an authenticated encryption...
Saved in:
Main Authors: | Sasaki, Yu, Wang, Lei |
---|---|
Other Authors: | Lee Kong Chian School of Medicine (LKCMedicine) |
Format: | Article |
Language: | English |
Published: |
2016
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/82092 http://hdl.handle.net/10220/39785 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
A study on giant panda recognition based on images of a large proportion of captive pandas
by: Chen, Peng, et al.
Published: (2021) -
Evaluation of MPEG-4 IPMP Extension
by: PANG, Hwee Hwa, et al.
Published: (2005) -
Giant panda behaviour recognition using images
by: Swarup, Pranjal, et al.
Published: (2021) -
The stream cipher core of the 3GPP encryption standard 128-EEA3: Timing attacks and countermeasures
by: Sekar, G.
Published: (2016) -
Update recovery attacks on encrypted database within two updates using range queries leakage
by: NING, Jianting, et al.
Published: (2022)