Understanding RUP Integrity of COLM

The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of two parallelizable encryption layers connected by a linear mixing function. While COPA uses plain XOR mixing, ELmE, ELmD, and COLM use a mor...

Full description

Bibliographic Details
Main Authors: Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2017-06-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
Online Access:https://tosc.iacr.org/index.php/ToSC/article/view/641