A construction of a cipher from a single pseudorandom permutation.

From MaRDI portal
Publication:1364898

DOI10.1007/s001459900025zbMath1053.94552OpenAlexW2064939672WikidataQ121597133 ScholiaQ121597133MaRDI QIDQ1364898

Yishay Mansour, Shimon Even

Publication date: 1997

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s001459900025




Related Items (71)

How to build an ideal cipher: the indifferentiability of the Feistel constructionBBB Secure Nonce Based MAC Using Public PermutationsSeparating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-MansourTweaking Even-Mansour CiphersMulti-key Security: The Even-Mansour Construction RevisitedThe Iterated Random Permutation Problem with Applications to Cascade EncryptionThe Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBCKey recovery attacks on iterated Even-Mansour encryption schemesTweak-Length Extension for Tweakable BlockciphersAn improved affine equivalence algorithm for random permutationsBeyond quadratic speedups in quantum attacks on symmetric schemesPost-quantum security of the Even-Mansour cipherConnecting tweakable and multi-key blockcipher securityEfficient slide attacksCryptanalysis of the Full 8.5-Round REESSE3+ Block CipherCryptanalysis of Round-Reduced $$\mathtt{LED}$$Tweakable Blockciphers with Asymptotically Optimal SecuritySecurity analysis of Even-Mansour structure hash functionsUsing Bernstein-Vazirani algorithm to attack block ciphersReflections on slide with a twist attacksImproved key-recovery attacks on reduced-round WEM-8Partition and mix: generalizing the swap-or-not shuffleBreaking symmetric cryptosystems using the offline distributed Grover-Meets-Simon algorithmQuantum key recovery attacks on tweakable Even-Mansour ciphersBlock encryption of quantum messagesCryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problemImpossibility of indifferentiable iterated blockciphers from 3 or less primitive callsEnergy consumption of protected cryptographic hardware cores. An experimental studyA quantum related-key attack based on the Bernstein-Vazirani algorithmCryptanalysis of reduced round SPEEDYPost-quantum security on the Lai-Massey schemeSimpira v2: A Family of Efficient Permutations Using the AES Round FunctionLayout graphs, random walks and the \(t\)-wise independence of SPN block ciphersQuantum key-recovery attack on Feistel constructions: Bernstein-Vazirani meet Grover algorithmBBB security for 5-round even-Mansour-based key-alternating Feistel ciphersBetter security-efficiency trade-offs in permutation-based two-party computationTight security for key-alternating ciphers with correlated sub-keysDesigning tweakable enciphering schemes using public permutationsMinimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules)Quantum attacks on PRFs based on public random permutationsProvable security against generic attacks on stream ciphersAn efficient affine equivalence algorithm for multiple S-boxes and a structured affine layerOutput masking of tweakable Even-Mansour can be eliminated for message authentication codeOn the security of keyed hashing based on public permutationsTight security analysis of 3-round key-alternating cipher with a single permutationJust tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipherQuantum key-length extensionSurvey on hardware implementation of random number generators on FPGA: theory and experimental analysesWEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour ConstructionTweakable block ciphersAlmost universal forgery attacks on AES-based MAC'sStrengthening the Known-Key Security Notion for Block CiphersLinear Analysis of Reduced-Round CubeHashMinimizing the two-round Even-Mansour cipherGeneric attacks on the Lai-Massey schemeQuick trickle permutation based on quick trickle characteristic sequencePublic-Seed Pseudorandom PermutationsSlidex attacks on the Even-Mansour encryption schemeAn observation on NORX, BLAKE2, and ChaChaHash Functions from Defective Ideal CiphersPseudorandomness of Camellia-like schemeTweaking a block cipher: multi-user beyond-birthday-bound security in the standard modelBreaking Symmetric Cryptosystems Using Quantum Period FindingKey-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user SecurityXPX: Generalized Tweakable Even-Mansour with Improved Security GuaranteesThe Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3Multi-user BBB security of public permutations based MACMore accurate results on the provable security of AES against impossible differential cryptanalysisQuantum generic attacks on key-alternating Feistel ciphers for shorter keysImproved BV-based quantum attack on block ciphersQuantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts



Cites Work


This page was built for publication: A construction of a cipher from a single pseudorandom permutation.