{"id":"https://openalex.org/W4400414691","doi":"https://doi.org/10.62056/a3qjp2fgx","title":"A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers","display_name":"A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers","publication_year":2024,"publication_date":"2024-07-08","ids":{"openalex":"https://openalex.org/W4400414691","doi":"https://doi.org/10.62056/a3qjp2fgx"},"language":"en","primary_location":{"id":"doi:10.62056/a3qjp2fgx","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a3qjp2fgx","pdf_url":"https://cic.iacr.org/p/1/2/17/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://cic.iacr.org/p/1/2/17/pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003483326","display_name":"Beno\u00eet Cogliati","orcid":"https://orcid.org/0000-0001-6445-2514"},"institutions":[{"id":"https://openalex.org/I4210140930","display_name":"Thales (France)","ror":"https://ror.org/04emwm605","country_code":"FR","type":"company","lineage":["https://openalex.org/I4210140930"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Beno\u00eet Cogliati","raw_affiliation_strings":["Thales DIS France SAS"],"affiliations":[{"raw_affiliation_string":"Thales DIS France SAS","institution_ids":["https://openalex.org/I4210140930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034881172","display_name":"J\u00e9r\u00e9my Jean","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"J\u00e9r\u00e9my Jean","raw_affiliation_strings":["ANSSI"],"affiliations":[{"raw_affiliation_string":"ANSSI","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012053340","display_name":"Thomas Peyrin","orcid":"https://orcid.org/0000-0002-2690-9197"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Thomas Peyrin","raw_affiliation_strings":["Nanyang Technological University"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048055873","display_name":"Yannick Seurin","orcid":"https://orcid.org/0000-0002-2948-9423"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yannick Seurin","raw_affiliation_strings":["Ledger"],"affiliations":[{"raw_affiliation_string":"Ledger","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5003483326"],"corresponding_institution_ids":["https://openalex.org/I4210140930"],"apc_list":null,"apc_paid":null,"fwci":0.7274,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.74714003,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptographic-nonce","display_name":"Cryptographic nonce","score":0.9195998907089233},{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated encryption","score":0.8006895780563354},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.7236795425415039},{"id":"https://openalex.org/keywords/block-cipher-mode-of-operation","display_name":"Block cipher mode of operation","score":0.6828511357307434},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6511688232421875},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6088448166847229},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5907174348831177},{"id":"https://openalex.org/keywords/rc4","display_name":"RC4","score":0.5192418098449707},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5058664679527283},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4411773085594177},{"id":"https://openalex.org/keywords/mdc-2","display_name":"MDC-2","score":0.41653889417648315},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3587419390678406},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3362516760826111},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.31767159700393677},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.254646360874176},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2521568536758423},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.13536879420280457}],"concepts":[{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.9195998907089233},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.8006895780563354},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.7236795425415039},{"id":"https://openalex.org/C60448319","wikidata":"https://www.wikidata.org/wiki/Q154021","display_name":"Block cipher mode of operation","level":2,"score":0.6828511357307434},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6511688232421875},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6088448166847229},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5907174348831177},{"id":"https://openalex.org/C109154458","wikidata":"https://www.wikidata.org/wiki/Q846955","display_name":"RC4","level":4,"score":0.5192418098449707},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5058664679527283},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4411773085594177},{"id":"https://openalex.org/C200086178","wikidata":"https://www.wikidata.org/wiki/Q3841252","display_name":"MDC-2","level":5,"score":0.41653889417648315},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3587419390678406},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3362516760826111},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.31767159700393677},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.254646360874176},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2521568536758423},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.13536879420280457},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.62056/a3qjp2fgx","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a3qjp2fgx","pdf_url":"https://cic.iacr.org/p/1/2/17/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.62056/a3qjp2fgx","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a3qjp2fgx","pdf_url":"https://cic.iacr.org/p/1/2/17/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4400414691.pdf"},"referenced_works_count":66,"referenced_works":["https://openalex.org/W1498886746","https://openalex.org/W1575640061","https://openalex.org/W1597235115","https://openalex.org/W1753861823","https://openalex.org/W1826530159","https://openalex.org/W1855109561","https://openalex.org/W1901278359","https://openalex.org/W1958084802","https://openalex.org/W1964776377","https://openalex.org/W1966364100","https://openalex.org/W2126290606","https://openalex.org/W2134553300","https://openalex.org/W2134615993","https://openalex.org/W2139747141","https://openalex.org/W2142081526","https://openalex.org/W2145227448","https://openalex.org/W2148555789","https://openalex.org/W2155115217","https://openalex.org/W2160950619","https://openalex.org/W2167569963","https://openalex.org/W2185381909","https://openalex.org/W2208284559","https://openalex.org/W2232945818","https://openalex.org/W2294631369","https://openalex.org/W2296016513","https://openalex.org/W2406798186","https://openalex.org/W2477309039","https://openalex.org/W2480541030","https://openalex.org/W2488274487","https://openalex.org/W2497610130","https://openalex.org/W2504919933","https://openalex.org/W2505511021","https://openalex.org/W2579400469","https://openalex.org/W2603513604","https://openalex.org/W2724317434","https://openalex.org/W2735846137","https://openalex.org/W2766649592","https://openalex.org/W2767098552","https://openalex.org/W2768296225","https://openalex.org/W2768802245","https://openalex.org/W2772793349","https://openalex.org/W2794569840","https://openalex.org/W2796025710","https://openalex.org/W2888162713","https://openalex.org/W2888915893","https://openalex.org/W2890252849","https://openalex.org/W2891609868","https://openalex.org/W2892310063","https://openalex.org/W2894522476","https://openalex.org/W2932021267","https://openalex.org/W2950869347","https://openalex.org/W2977416691","https://openalex.org/W2978588021","https://openalex.org/W2990961241","https://openalex.org/W2992337242","https://openalex.org/W2995820240","https://openalex.org/W3022759749","https://openalex.org/W3112928074","https://openalex.org/W3118229390","https://openalex.org/W3168518876","https://openalex.org/W3186536863","https://openalex.org/W3201306356","https://openalex.org/W4225883647","https://openalex.org/W4317928333","https://openalex.org/W4365807830","https://openalex.org/W4395962186"],"related_works":["https://openalex.org/W3193457379","https://openalex.org/W2406798186","https://openalex.org/W3216632971","https://openalex.org/W104182314","https://openalex.org/W4253338219","https://openalex.org/W2771119600","https://openalex.org/W2766321958","https://openalex.org/W1864901766","https://openalex.org/W4220997891","https://openalex.org/W4400414691"],"abstract_inverted_index":{"We":[0,54,152,239,303,327],"analyze":[1],"the":[2,32,36,41,47,51,68,76,82,91,109,113,119,125,132,136,156,172,175,188,197,201,214,242,266,315,340],"multi-user":[3],"(mu)":[4],"security":[5,34,70,134,199,338],"of":[6,9,25,31,35,46,71,75,128,135,159,200,203,219,244,265,342],"a":[7,17,93,95,99,143,165,227,289,306,335],"family":[8,202,268],"nonce-based":[10,137],"authentication":[11,126],"encryption":[12,78,83],"(nAE)":[13],"schemes":[14],"based":[15],"on":[16,187],"tweakable":[18],"block":[19],"cipher":[20],"(TBC).":[21],"The":[22],"starting":[23],"point":[24],"our":[26,245,343],"work":[27],"is":[28,178,233,281],"an":[29,146,160,223,299],"analysis":[30,57],"mu":[33,69,133,198],"SCT-II":[37,129],"mode":[38,79,84],"which":[39,258],"underlies":[40],"nAE":[42,204],"scheme":[43],"Deoxys-II,":[44],"winner":[45],"CAESAR":[48],"competition":[49],"for":[50,236,292],"defense-in-depth":[52],"category.":[53],"extend":[55],"this":[56],"in":[58],"two":[59,251],"directions,":[60],"as":[61,103,262],"we":[62,66,123,286],"detail":[63],"now.":[64],"First,":[65],"investigate":[67],"several":[72],"TBC-based":[73],"variants":[74],"counter":[77,100],"(including":[80],"CTRT,":[81],"used":[85],"within":[86,314],"SCT-II)":[87],"that":[88,116,155,174,288,332],"differ":[89],"by":[90,207,247],"way":[92],"nonce,":[94],"random":[96],"value,":[97],"and":[98,105,130,145,256,324],"are":[101],"combined":[102],"tweak":[104,229,271],"plaintext":[106,120],"inputs":[107],"to":[108,111,195,269,283,310,321],"TBC":[110,144,177,225,253],"produce":[112],"keystream":[114],"blocks":[115,212],"will":[117],"mask":[118],"blocks.":[121],"Then,":[122],"consider":[124],"part":[127],"study":[131],"MAC":[138],"Nonce-as-Tweak":[139],"(NaT)":[140],"built":[141],"from":[142,164],"almost":[147],"universal":[148],"(AU)":[149],"hash":[150,162],"function.":[151],"also":[153],"observe":[154],"standard":[157],"construction":[158,301],"AU":[161,190],"function":[163],"(T)BC":[166],"can":[167,259],"be":[168,260],"proven":[169],"secure":[170],"under":[171],"assumption":[173],"underlying":[176,224],"unpredictable":[179],"rather":[180],"than":[181,231],"pseudorandom,":[182],"allowing":[183],"much":[184],"better":[185],"conjectures":[186],"concrete":[189],"advantage.":[191],"This":[192],"allows":[193],"us":[194],"derive":[196],"modes":[205,221,246],"obtained":[206],"combining":[208],"these":[209,220],"encryption/MAC":[210],"building":[211],"through":[213],"NSIV":[215],"composition":[216],"method.":[217],"Some":[218],"require":[222],"with":[226,250,277],"larger":[228,270],"length":[230],"what":[232],"usually":[234],"available":[235],"existing":[237],"ones.":[238],"then":[240],"show":[241,287],"practicality":[243],"instantiating":[248],"them":[249],"new":[252,322],"constructions,":[254],"Deoxys-TBC-512":[255],"Deoxys-TBC-640,":[257],"seen":[261],"natural":[263],"extensions":[264],"Deoxys-TBC":[267,323],"input":[272],"sizes.":[273],"Designing":[274],"such":[275],"TBCs":[276,313],"unusually":[278],"large":[279],"tweaks":[280],"prone":[282],"pitfalls:":[284],"Indeed,":[285],"large-tweak":[290,312],"proposal":[291],"SKINNY":[293,325],"published":[294],"at":[295],"EUROCRYPT":[296],"2020":[297],"presents":[298],"inherent":[300],"flaw.":[302],"therefore":[304],"provide":[305,328],"sound":[307],"design":[308],"strategy":[309],"construct":[311],"Superposition":[316],"Tweakey":[317],"(STK)":[318],"framework,":[319],"leading":[320],"variants.":[326],"software":[329],"benchmarks":[330],"indicating":[331],"while":[333],"ensuring":[334],"very":[336,346],"high":[337],"level,":[339],"performances":[341],"proposals":[344],"remain":[345],"competitive.":[347]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
