Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2016_2_a3, author = {A. Yu. Zubov}, title = {On the security of {AEAD-cryptosystem} of the {GCM} type}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {49--62}, publisher = {mathdoc}, number = {2}, year = {2016}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2016_2_a3/} }
A. Yu. Zubov. On the security of AEAD-cryptosystem of the GCM type. Prikladnaâ diskretnaâ matematika, no. 2 (2016), pp. 49-62. http://geodesic.mathdoc.fr/item/PDM_2016_2_a3/
[1] Black J., Message authentication codes, PhD Dissertation, Dept. of Comp. Sciences, US Davis, 2000, 126 pp. http://www.cs.colorado.edu/~jrblack/
[2] Stinson D., “Universal hash families and the leftover hash lemma, and applications to cryptography and computing”, J. Combin. Math. Combin. Comput., 42:3 (2001), 29 | MR
[3] Bellare M., Namprempre C., “Authenticated encryption: relations among notions and analysis of the composition paradigm”, Asiacrypt 2000, LNCS, 1976, 2000, 541–545 | MR
[4] CAESAR: competition for authenticated encryption: security, applicability, and robustness, , 2012 http://competitions.cr.yp.to/caesar.html
[5] Chakraborty D., Sarkar P., On modes of operations of a block cipher for authentication and authenticated encryption, Cryptology ePrint Archive: , 2014, 51 pp. http://eprint.iacr.org/2014/627
[6] Rogaway P., Authenticated-encryption with associated-data, ACM CCS, ACM Press, 2002, 10 pp.
[7] Svenda P., Basic Comparison of Modes for Authenticated-Encryption (IAPM, XCBC, OCB, CCM, EAX, CWC, GCM, PCFB, CS), , 2005, 16 pp. https://www.fi.muni.cz/~xsvenda/docs/AE_comparison_ipics04.pdf
[8] McGrew D. A., Viega J., “The security and performance of Galois/Counter mode of operation”, LNCS, 3348, 2004, 343–355 | MR | Zbl
[9] Bellare M., “Practice-oriented provable-security”, LNCS, 1561, 2003, 1–15 | MR
[10] Shrimpton T., A characterization of authenticated-encryption as a form of chosen-ciphertext security, Cryptology ePrint Archive: , 2004, 7 pp. http://eprint.iacr.org/2004/272
[11] Bellare M., Kilian J., Rogaway P., “The security of the cipher block chaining”, LNCS, 839, 1994, 341–358 | Zbl
[12] Iwata T., Ohashi K., Minematsu K., “Breaking and repairing GCM security proofs”, Crypto 2012, LNCS, 7417, 2012, 31–49 | MR | Zbl
[13] Ferguson N., Authentication weaknesses in GCM, Public Comments to NIST, , May 2005 http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/comments/CWC-GCM/Ferguson2.pdf