Towards tight security of cascaded LRW2
From MaRDI portal
Publication:1631325
DOI10.1007/978-3-030-03810-6_8zbMath1430.94083OpenAlexW2811287731MaRDI QIDQ1631325
Publication date: 6 December 2018
Full work available at URL: https://doi.org/10.1007/978-3-030-03810-6_8
Related Items (8)
Tight security of cascaded LRW2 ⋮ Proof of mirror theory for a wide range of \(\xi_{\max }\) ⋮ Towards closing the security gap of Tweak-aNd-Tweak (TNT) ⋮ Minimizing the two-round tweakable Even-Mansour cipher ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ How to build optimally secure PRFs using block ciphers ⋮ Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher ⋮ TNT: how to tweak a block cipher
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- New hash functions and their use in authentication and set equality
- ZMAC: a fast tweakable block cipher mode for highly secure message authentication
- Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory
- Advances in cryptology -- CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20--24, 2017. Proceedings. Part II
- Connecting tweakable and multi-key blockcipher security
- Advances in cryptology -- CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14--18, 2016. Proceedings. Part I
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
- Parallelizable and Authenticated Online Ciphers
- Minimizing the Two-Round Even-Mansour Cipher
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- Tweakable Blockciphers with Asymptotically Optimal Security
- Robust Authenticated-Encryption AEZ and the Problem That It Solves
- Feistel Ciphers
- The Software Performance of Authenticated-Encryption Modes
- Tweaking Even-Mansour Ciphers
- A New Criterion for Nonlinearity of Block Ciphers
- The “Coefficients H” Technique
- Perfect nonlinear S-boxes
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Tight Security Bounds for Key-Alternating Ciphers
- Improved Security Analysis of XEX and LRW Modes
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Information Security and Cryptology - ICISC 2005
This page was built for publication: Towards tight security of cascaded LRW2