Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm

Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm

TheIACR via YouTube Direct link

Encryption vs. Authenticated Encryption

3 of 15

3 of 15

Encryption vs. Authenticated Encryption

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Outline
  3. 3 Encryption vs. Authenticated Encryption
  4. 4 CAESAR Competition: Submissions
  5. 5 Linear Mixing Function
  6. 6 Message Padding Rule
  7. 7 Processing Associated Data
  8. 8 Security Claims
  9. 9 Recovering Internal State L
  10. 10 Universal Forgery
  11. 11 Exploiting the Structure of ELmD
  12. 12 Querying Decryption Oracle of AES
  13. 13 Key Recovery Attack on ElmD(6.6)
  14. 14 Comparison with the Previous Results
  15. 15 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.