A. Abl-+-14]-elena-andreeva, A. Bogdanov, B. Luykx, N. Mennink, K. Mouha et al., How to Securely Release Unverified Plaintext in Authenticated Encryption, Palash Sarkar and Tetsu Iwata, vol.8873, pp.105-125, 2014.

T. Ashur, O. Dunkelman, and A. Luykx, Boosting Authenticated Encryption Robustness with Minimal Modifications, Part III, vol.10403, pp.3-33, 2017.

S. Banik, A. Bogdanov, A. Luykx, and E. Tischhauser, SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things, IACR Trans. Symmetric Cryptol, vol.2018, issue.3, pp.1-35, 2018.

. Bbp-+-19]-subhadeep, A. Banik, T. Bogdanov, Y. Peyrin, . Sasaki et al., , 2019.

G. Bertoni, J. Daemen, M. Peeters, and G. Van-assche, Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications, LNCS, vol.7118, pp.320-337, 2011.

Z. Bao, J. Guo, T. Iwata, and L. Song, Submission to NIST Lightweight Cryptography Standardization Process, 2019.

Z. Bao and J. Guo, Tetsu Iwata, and Ling Song. SIV-TEM-PHOTON Authenticated Encryption and Hash Family, 2019.

G. Barwell, D. Page, and M. Stam, Rogue Decryption Failures: Reconciling AE Robustness Notions, LNCS, vol.9496, pp.94-111, 2015.

, Submission to NIST Lightweight Cryptography Standardization Process, 2019.

A. Chakraborti, N. Datta, and M. Nandi, INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes, LNCS, vol.9610, pp.39-54, 2016.

A. Chakraborti, N. Datta, and M. Nandi, On the optimality of non-linear computations for symmetric key primitives, J. Mathematical Cryptology, vol.12, issue.4, pp.241-259, 2018.

A. Chakraborti, N. Datta, M. Nandi, and K. Yasuda, Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers, IACR Trans. Cryptogr. Hardw. Embed. Syst, vol.2018, issue.2, pp.218-241, 2018.

A. Chakraborti, T. Iwata, K. Minematsu, and M. Nandi, Blockcipher-Based Authenticated Encryption: How Small Can We Go?, LNCS, vol.10529, pp.277-298, 2017.

D. Chang, N. Datta, A. Dutta, B. Mennink, and M. Nandi, Somitra Sanadhya and Ferdinand Sibleyras, p.27

S. Chen and J. P. Steinberger, Tight Security Bounds for Key-Alternating Ciphers, LNCS, vol.8441, pp.327-350, 2014.

S. Contini and Y. Lisa-yin, On Differential Properties of Data-Dependent Rotations and Their Use in MARS and RC6, 1999.

. Dgm-+-19]-nilanjan, A. Datta, D. Ghoshal, and . Mukhopadhyay, Sikhar Patranabis, Stjepan Picek, and Rajat Sadhukhan. TRIFLE, 2019.

N. Datta, A. Luykx, B. Mennink, and M. Nandi, Understanding RUP Integrity of COLM. IACR Trans. Symmetric Cryptol, vol.2017, issue.2, pp.143-161, 2017.

J. Daemen, B. Mennink, and G. Van-assche, Full-State Keyed Duplex with Built-In Multi-user Support, Part, vol.II, pp.606-637, 2017.

. Springer, , 2017.

, DES Modes of Operation, vol.81, 1980.

P. Fouque, A. Joux, G. Martinet, and F. Valette, Authenticated On-Line Encryption, LNCS, vol.3006, pp.145-159, 2003.
URL : https://hal.archives-ouvertes.fr/inria-00563967

G. Pierre-alain-fouque, G. Martinet, and . Poupard, Practical Symmetric On-Line Encryption, LNCS, vol.2887, pp.362-375, 2003.

T. Viet-tung-hoang, P. Krovetz, and . Rogaway, Robust Authenticated-Encryption AEZ and the Problem That It Solves, EUROCRYPT 2015, Part I, vol.9056, pp.15-44, 2015.

S. Hirose, Y. Sasaki, and K. Yasuda, Rate-One AE with Security Under RUP, LNCS, vol.10599, pp.3-20, 2017.

T. Iwata, K. Minematsu, J. Guo, and S. Morioka, CLOC: Authenticated Encryption for Short Input, LNCS, vol.8540, pp.149-167, 2014.

K. Imamura, K. Minematsu, and T. Iwata, Integrity analysis of authenticated encryption based on stream ciphers, Int. J. Inf. Sec, vol.17, issue.5, pp.493-511, 2018.

B. Mennink, R. Reyhanitabar, and D. Vizár, Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption, ASIACRYPT 2015, Part II, vol.9453, pp.465-489, 2015.

M. Nandi, Fast and Secure CBC-Type MAC Algorithms, LNCS, vol.5665, pp.375-393, 2009.

, Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE [Nat18] National Institute of Standards and Technology (NIST). Submission Requirements and Evaluation Criteria for the Lightweight Cryptography Standardization Process, 2018.

Y. Naito, M. Matsui, T. Sugawara, and D. Suzuki, SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation, IACR Trans. Cryptogr. Hardw. Embed. Syst, vol.2018, issue.2, pp.192-217, 2018.

J. Patarin, The "Coefficients H" Technique, LNCS, vol.5381, pp.328-345, 2008.

P. Rogaway and T. Shrimpton, A Provable-Security Treatment of the Key-Wrap Problem, LNCS, vol.4004, pp.373-390, 2006.

H. Wu and T. Huang, The JAMBU Lightweight Authentication Encryption Mode (v2.1), 2016. Submission to CAESAR competition

P. Zhang, P. Wang, H. Hu, C. Cheng, and W. Kuai, INT-RUP Security of Checksum-Based Authenticated Encryption, LNCS, vol.10592, pp.147-166, 2017.