Presentation | 2012-12-12 Breaking and Repairing GCM Security Proofs (from CRYPTO 2012) Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In this talk, we present results of the paper [T. Iwata, K. Ohashi, and K. Minematsu, Breaking and Repairing GCM Security Proofs, R. Safavi-Naini and R. Canetti (Eds.), CRYPTO 2012, LNCS 7417, pp. 31-49, Springer, Heidelberg, 2012] that was published at CRYPTO 2012. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | GCM / counter-example / distinguishing attack / proof of security |
Paper # | ISEC2012-78 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2012/12/5(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Breaking and Repairing GCM Security Proofs (from CRYPTO 2012) |
Sub Title (in English) | |
Keyword(1) | GCM |
Keyword(2) | counter-example |
Keyword(3) | distinguishing attack |
Keyword(4) | proof of security |
1st Author's Name | Tetsu Iwata |
1st Author's Affiliation | Nagoya University() |
2nd Author's Name | Keisuke Ohashi |
2nd Author's Affiliation | Nagoya University |
3rd Author's Name | Kazuhiko Minematsu |
3rd Author's Affiliation | NEC Corporation |
Date | 2012-12-12 |
Paper # | ISEC2012-78 |
Volume (vol) | vol.112 |
Number (no) | 342 |
Page | pp.pp.- |
#Pages | 38 |
Date of Issue |