{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:14:12Z","timestamp":1742912052238,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031229114"},{"type":"electronic","value":"9783031229121"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-22912-1_7","type":"book-chapter","created":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T15:38:49Z","timestamp":1672501129000},"page":"146-170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["INT-RUP Security of\u00a0SAEB and\u00a0TinyJAMBU"],"prefix":"10.1007","author":[{"given":"Nilanjan","family":"Datta","sequence":"first","affiliation":[]},{"given":"Avijit","family":"Dutta","sequence":"additional","affiliation":[]},{"given":"Shibam","family":"Ghosh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,1]]},"reference":[{"key":"7_CR1","unstructured":"Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC. NIST Special Publication 800-38D. National Institute of Standards and Technology (2007)"},{"key":"7_CR2","unstructured":"AlTawy, R., Gong, G., He, M., Jha, A., Mandal, K., Nandi, M., Rohit, R.; SpoC: an authenticated cipher submission to the NIST LWC competition (2019). https:\/\/csrc.nist.gov\/projects\/lightweight-cryptography\/round-2-candidates"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Andreeva, E., Bhati, A.S., Vizar, D.: Nonce-misuse security of the SAEF authenticated encryption mode. Cryptology ePrint Archive, Report 2020\/1524 (2020)","DOI":"10.1007\/978-3-030-81652-0_20"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Andreeva, E., Bhati, A.S., Vizar, D.: Rup security of the SAEF authenticated encryption mode. Cryptology ePrint Archive, Report 2021\/103 (2021)","DOI":"10.1007\/978-3-030-81652-0_20"},{"key":"7_CR5","unstructured":"Andreeva, E., et al.: COLM v1. CAESAR Competition"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-662-45611-8_6","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","author":"E Andreeva","year":"2014","unstructured":"Andreeva, E., Bogdanov, A., Luykx, A., Mennink, B., Mouha, N., Yasuda, K.: How to securely release unverified plaintext in authenticated encryption. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 105\u2013125. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45611-8_6"},{"key":"7_CR7","unstructured":"Andreeva, E., Bogdanov, A., Luykx, A., Mennink, B., Tischhauser, E., Yasuda, K.: AES-COPA, vol 2. Submission to CAESAR (2015). https:\/\/competitions.cr.yp.to\/round2\/aescopav2.pdf"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-030-34621-8_6","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2019","author":"E Andreeva","year":"2019","unstructured":"Andreeva, E., Lallemand, V., Purnal, A., Reyhanitabar, R., Roy, A., Viz\u00e1r, D.: Forkcipher: a new primitive for authenticated encryption of very short messages. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019. LNCS, vol. 11922, pp. 153\u2013182. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-34621-8_6"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-63697-9_1","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"T Ashur","year":"2017","unstructured":"Ashur, T., Dunkelman, O., Luykx, A.: Boosting authenticated encryption robustness with minimal modifications. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10403, pp. 3\u201333. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63697-9_1"},{"key":"7_CR10","first-page":"2018","volume":"3","author":"S Banik","year":"2018","unstructured":"Banik, S., Bogdanov, A., Luykx, A., Tischhauser, E.: Sundae: small universal deterministic authenticated encryption for the internet of things. IACR Trans. Symmetric Cryptol. 3, 2018 (2018)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Beierle, C., et al.: SKINNY-AEAD and skinny-hash. IACR Trans. Symmetric Cryptol. 2020(S1), 88\u2013131 (2020)","DOI":"10.46586\/tosc.v2020.iS1.88-131"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/11761679_25","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"M Bellare","year":"2006","unstructured":"Bellare, M., Rogaway, P.: The security of triple encryption and a framework\u00a0for\u00a0code-based\u00a0game-playing\u00a0proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409\u2013426. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11761679_25"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Bhattacharjee, A., L\u00f3pez, C.M., List, E., Nandi, M.: The oribatida v1.3 family of lightweight authenticated encryption schemes. J. Math. Cryptol. 15(1) (2021)","DOI":"10.1515\/jmc-2020-0018"},{"key":"7_CR14","unstructured":"CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness (2014). http:\/\/competitions.cr.yp.to\/caesar.html"},{"issue":"4","key":"7_CR15","first-page":"81","volume":"2019","author":"A Chakraborti","year":"2019","unstructured":"Chakraborti, A., Datta, N., Jha, A., Mancillas-L\u00f3pez, C., Nandi, M., Sasaki, Yu.: INT-RUP secure lightweight parallel AE modes. IACR Trans. Symmetric Cryptol. 2019(4), 81\u2013118 (2019)","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"S1","key":"7_CR16","doi-asserted-by":"publisher","first-page":"417","DOI":"10.46586\/tosc.v2020.iS1.417-445","volume":"2020","author":"A Chakraborti","year":"2020","unstructured":"Chakraborti, A., Datta, N., Jha, A., Mitragotri, S., Nandi, M.: From combined to hybrid: Making feedback-based AE even smaller. IACR Trans. Symmetric Cryptol. 2020(S1), 417\u2013445 (2020)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-319-29485-8_3","volume-title":"Topics in Cryptology - CT-RSA 2016","author":"A Chakraborti","year":"2016","unstructured":"Chakraborti, A., Datta, N., Nandi, M.: INT-RUP analysis of block-cipher based authenticated encryption schemes. In: Sako, K. (ed.) CT-RSA 2016. LNCS, vol. 9610, pp. 39\u201354. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29485-8_3"},{"issue":"2","key":"7_CR18","doi-asserted-by":"publisher","first-page":"218","DOI":"10.46586\/tches.v2018.i2.218-241","volume":"2018","author":"A Chakraborti","year":"2018","unstructured":"Chakraborti, A., Datta, N., Nandi, M., Yasuda, K.: Beetle family of lightweight and secure authenticated encryption ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2), 218\u2013241 (2018)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Chakraborti, A., Iwata, T., Minematsu, K., Nandi, M.: Blockcipher-based authenticated encryption: how small can we go? In: CHES 2017, Proceedings, pp. 277\u2013298 (2017)","DOI":"10.1007\/978-3-319-66787-4_14"},{"issue":"4","key":"7_CR20","first-page":"119","volume":"2019","author":"D Chang","year":"2019","unstructured":"Chang, D., et al.: Release of unverified plaintext: tight unified model and application to ANYDAE. IACR Trans. Symmetric Cryptol. 2019(4), 119\u2013146 (2019)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"7_CR21","first-page":"78","volume":"2008","author":"D Chang","year":"2008","unstructured":"Chang, D., Nandi, M.: A short proof of the PRP\/PRF switching lemma. IACR Cryptol. ePrint Arch. 2008, 78 (2008)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"7_CR22","unstructured":"Datta, N., Dutta, A., Ghosh, S.: INT-RUP security of SAEB and tinyjambu. Cryptology ePrint Archive, Paper 2022\/1414 (2022). https:\/\/eprint.iacr.org\/2022\/1414"},{"issue":"2","key":"7_CR23","doi-asserted-by":"publisher","first-page":"143","DOI":"10.46586\/tosc.v2017.i2.143-161","volume":"2017","author":"N Datta","year":"2017","unstructured":"Datta, N., Luykx, A., Mennink, B., Nandi, M.: Understanding RUP integrity of COLM. IACR Trans. Symmetric Cryptol. 2017(2), 143\u2013161 (2017)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"7_CR24","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl\u00e4ffer, M.: Ascon v1.2. Submission to CAESAR (2016). https:\/\/competitions.cr.yp.to\/round3\/asconv12.pdf"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Dunkelman, O., Lambooij, E., Ghosh, S.: Practical related-key forgery attacks on the full tinyjambu-192\/256. Cryptology ePrint Archive, Paper 2022\/1122 (2022)","DOI":"10.46586\/tosc.v2023.i2.176-188"},{"issue":"1","key":"7_CR26","doi-asserted-by":"publisher","first-page":"43","DOI":"10.46586\/tosc.v2020.i1.43-120","volume":"2020","author":"T Iwata","year":"2020","unstructured":"Iwata, T., Khairallah, M., Minematsu, K., Peyrin, T.: Duel of the titans: the romulus and remus families of lightweight AEAD algorithms. IACR Trans. Symmetric Cryptol. 2020(1), 43\u2013120 (2020)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"7_CR27","unstructured":"Iwata, T., Minematsu, K., Guo, J., Morioka, S., Kobayashi, E.: CAESAR Candidate CLOC. DIAC (2014)"},{"issue":"3","key":"7_CR28","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s00145-021-09397-w","volume":"34","author":"J Jean","year":"2021","unstructured":"Jean, J., Nikolic, I., Peyrin, T., Seurin, Y.: The deoxys AEAD family. J. Cryptol. 34(3), 31 (2021)","journal-title":"J. Cryptol."},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"McKay, K.A., Bassham, L., Turan, M.S., Mouha, N.: Report on lightweight cryptography (2017). http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2017\/NIST.IR.8114.pdf","DOI":"10.6028\/NIST.IR.8114"},{"key":"7_CR30","unstructured":"Minematsu, K.: AES-OTR v3.1. Submission to CAESAR (2016). https:\/\/competitions.cr.yp.to\/round3\/aesotrv31.pdf"},{"key":"7_CR31","unstructured":"Montes, M., Penazzi, D.: AES-CPFB v1. Submission to CAESAR (2015). https:\/\/competitions.cr.yp.to\/round1\/aescpfbv1.pdf"},{"key":"7_CR32","unstructured":"Naito, Y., Matsui, M., Sakai, Y., Suzuki, D., Sakiyama, K., Sugawara, T.: SAEAES: submission to NIST LwC (2019). https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/lightweight-cryptography\/documents\/round-2\/spec-doc-rnd2\/SAEAES-spec-round2.pdf"},{"issue":"2","key":"7_CR33","doi-asserted-by":"publisher","first-page":"192","DOI":"10.46586\/tches.v2018.i2.192-217","volume":"2018","author":"Y Naito","year":"2018","unstructured":"Naito, Y., Matsui, M., Sugawara, T., Suzuki, D.: SAEB: A lightweight blockcipher-based AEAD mode of operation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2), 192\u2013217 (2018)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"Patarin, J.: The \u201ccoefficients h\u201d technique. In: Selected Areas in Cryptography, pp. 328\u2013345 (2008)","DOI":"10.1007\/978-3-642-04159-4_21"},{"key":"7_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-30539-2_2","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"P Rogaway","year":"2004","unstructured":"Rogaway, P.: Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 16\u201331. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30539-2_2"},{"key":"7_CR36","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-031-15255-9_6","volume-title":"IWSEC 2022","author":"F Sibleyras","year":"2022","unstructured":"Sibleyras, F., Sasaki, Y., Todo, Y., Hosoyamada, A., Yasuda, K.: Birthday-bound slide attacks on TinyJAMBU\u2019s keyed-permutations for all key sizes. In: Cheng, C.M., Akiyama, M. (eds.) IWSEC 2022. LNCS, vol. 13504, pp. 107\u2013127. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-15255-9_6"},{"key":"7_CR37","unstructured":"Wu, H.: ACORN: a lightweight authenticated cipher (v3). Submission to CAESAR (2016). https:\/\/competitions.cr.yp.to\/round3\/acornv3.pdf"},{"key":"7_CR38","unstructured":"Wu, H., Huang, T.: The JAMBU lightweight authentication encryption mode (v2.1). Submission to CAESAR (2016). https:\/\/competitions.cr.yp.to\/round3\/jambuv21.pdf"},{"key":"7_CR39","unstructured":"Wu, H., Huang, T.: TinyJAMBU: a family of lightweight authenticated encryption algorithms: submission to NIST LwC (2019). https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/lightweight-cryptography\/documents\/finalist-round\/updated-spec-doc\/tinyjambu-spec-final.pdf"},{"key":"7_CR40","unstructured":"Zhang, L., Wu, W., Sui, H., Wang, P.: iFeed[AES] v1. Submission to CAESAR (2014). https:\/\/competitions.cr.yp.to\/round1\/ifeedaesv1.pdf"},{"key":"7_CR41","unstructured":"Zhang, P., Wang, P., Hu, H.: The INT-RUP security of OCB with intermediate (parity) checksum. IACR Cryptology ePrint Archive (2017). https:\/\/eprint.iacr.org\/2016\/1059.pdf"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 INDOCRYPT 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22912-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,3]],"date-time":"2023-12-03T20:24:06Z","timestamp":1701635046000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22912-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031229114","9783031229121"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22912-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"1 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INDOCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in India","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"indocrypt2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.tcgcrest.org\/indocrypt-2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"74","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.22","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.59","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}