Explore a comprehensive analysis of EAX-Prime's security vulnerabilities and proofs in this 23-minute conference talk presented at FSE 2013. Delve into the research conducted by Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, and Tetsu Iwata as they examine potential attacks on the EAX-Prime encryption mode and provide in-depth security proofs. Gain valuable insights into the cryptographic strengths and weaknesses of this algorithm, enhancing your understanding of modern encryption techniques and their practical implications in the field of information security.
Overview
Syllabus
Attacks and Security Proofs of EAX-Prime
Taught by
TheIACR