Additional resources

We next provide additional resources related to the Spook authenticated encryption algorithm, in partircular references related to the design of Spook and slides from the Spook workshop that took place in July 2019.

Related works (references)

The concept of leveled implementations was introduced in:

The decryption-based tag verification that Spook exploits is analyzed in:

The definitional framework on which Spook relies can be found in:

The LS-design strategy that our tweakable block cipher and permutation follow is described in:

Spook workshop

We organized a workshop related to the design and implementation of Spook in July 2019. The workshop program with presentation slides is displayed next: