<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Farzaneh Abed</style></author><author><style face="normal" font="default" size="100%">Francesco Berti</style></author><author><style face="normal" font="default" size="100%">Stefan Lucks</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Attacking a Leakage-Resilient Authenticated Encryption Scheme without Leakage</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">attack</style></keyword><keyword><style  face="normal" font="default" size="100%">authenticated encryption</style></keyword><keyword><style  face="normal" font="default" size="100%">block cypher</style></keyword><keyword><style  face="normal" font="default" size="100%">leakage-resilience</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">37</style></volume><pages><style face="normal" font="default" size="100%">45-53</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Leakage-resilient authenticated encryption (AE) aims at privacy and authenticity against adversaries with an additional side channel. The first published “leakage resilient” AE scheme is the RCB block cipher mode. As it turns out, RCB is insecure, even if there is no side channel for the adversary. The current paper presents several attacks on RCB.</style></abstract></record></records></xml>