@article{MVK_2019_10_2_a3,
author = {L. R. Ahmetzyanova and G. A. Karpunin and G. K. Sedov},
title = {Near birthday attack on {{\cyrv}{\CYRDJE}{\cyrnje}}$8$ {bits{\cyrv}{\CYRDJE}{\`\cyrk}} $\mathsf{AEAD}$ mode},
journal = {Matemati\v{c}eskie voprosy kriptografii},
pages = {47--60},
year = {2019},
volume = {10},
number = {2},
language = {en},
url = {http://geodesic.mathdoc.fr/item/MVK_2019_10_2_a3/}
}
TY - JOUR
AU - L. R. Ahmetzyanova
AU - G. A. Karpunin
AU - G. K. Sedov
TI - Near birthday attack on “$8$ bits” $\mathsf{AEAD}$ mode
JO - Matematičeskie voprosy kriptografii
PY - 2019
SP - 47
EP - 60
VL - 10
IS - 2
UR - http://geodesic.mathdoc.fr/item/MVK_2019_10_2_a3/
LA - en
ID - MVK_2019_10_2_a3
ER -
L. R. Ahmetzyanova; G. A. Karpunin; G. K. Sedov. Near birthday attack on “$8$ bits” $\mathsf{AEAD}$ mode. Matematičeskie voprosy kriptografii, Tome 10 (2019) no. 2, pp. 47-60. http://geodesic.mathdoc.fr/item/MVK_2019_10_2_a3/
[1] M. Bellare, P. Rogaway, D. Wagner, “The EAX mode of operation”, FSE 2004, Lect. Notes Comput. Sci., 3017, 2004, 389–407 | DOI | Zbl
[2] CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness, , 2014 http://competitions.cr.yp.to/caesar.html
[3] 802.11-2016 - IEEE Standard for Information technology - Telecommunications and information exchange between systems. Local and metropolitan area networks - Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, , 14 Dec. 2016 https://ieeexplore.ieee.org/document/7786995/
[4] Information technology. Cryptographic protection of information. Block cipher modes of operation. GOST R 34.13-2015, STANDARTINFORM, M., 2016 (in Russian)
[5] J. Jonsson, “On the security of CTR + CBC-MAC”, SAC 2002, Lect. Notes Comput. Sci., 2595, 2003, 76–93 | DOI | MR | Zbl
[6] E. Rescorla, The transport layer security (TLS) protocol version 1.3, RFC, 8446, Internet Engineering Task Force (IETF), August 2018, 160 pp. https://tools.ietf.org/html/rfc8446
[7] P. Rogaway, T. Shrimpton, “A provable-security treatment of the key-wrap problem”, EUROCRYPT 2006, Lect. Notes Comput. Sci., 4004, 2006, 373–390 | DOI | MR | Zbl
[8] T. Shrimpton, A characterization of authenticated-encryption as a form of chosen-ciphertext security, Report 2004/272, , IACR ePrint Archive, 2004, 7 pp. https://eprint.iacr.org/2004/272.pdf
[9] D. Whiting, R. Housley, N. Ferguson, Counter with CBC-MAC (CCM), RFC, 3610, Internet Engineering Task Force (IETF), September 2003, 26 pp. http://tools.ietf.org/html/rfc3610 | Zbl