TNT: how to tweak a block cipher
From MaRDI portal
Publication:2119027
DOI10.1007/978-3-030-45724-2_22zbMath1492.94062OpenAlexW3022296361MaRDI QIDQ2119027
Jian Guo, Ling Song, Zhenzhen Bao, Chun Guo
Publication date: 23 March 2022
Full work available at URL: https://hdl.handle.net/10356/141805
Related Items (3)
Truncated boomerang attacks and application to AES-based ciphers ⋮ Towards closing the security gap of Tweak-aNd-Tweak (TNT) ⋮ Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Advances in cryptology -- ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4--8, 2016. Proceedings. Part I
- Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13--16, 2011. Revised selected papers
- The design of Rijndael. The Advanced Encryption Standard (AES)
- Advances in cryptology -- ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2--6, 2018. Proceedings. Part I
- Towards tight security of cascaded LRW2
- Short variable length domain extenders with beyond birthday bound security
- Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model
- Boomerang Connectivity Table: a new cryptanalysis tool
- ZMAC: a fast tweakable block cipher mode for highly secure message authentication
- Information-theoretic indistinguishability via the chi-squared method
- Insuperability of the standard versus ideal model gap for tweakable blockcipher security
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- The exchange attack: how to distinguish six rounds of AES with \(2^{88.2}\) chosen plaintexts
- Tight security of cascaded LRW2
- XHX -- a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing
- Progress in cryptology -- INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14--17, 2008. Proceedings
- Yoyo tricks with AES
- Fast garbling of circuits under standard assumptions
- Advances in cryptology -- CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16--20, 2015. Proceedings. Part I
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
- Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Tweakable Blockciphers with Asymptotically Optimal Security
- Optimally Secure Tweakable Blockciphers
- Robust Authenticated-Encryption AEZ and the Problem That It Solves
- Salvaging Weak Security Bounds for Blockcipher-Based Constructions
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
- Pushing the Limits: A Very Compact and a Threshold Implementation of AES
- Breaking Grain-128 with Dynamic Cube Attacks
- The Software Performance of Authenticated-Encryption Modes
- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher
- A Domain Extender for the Ideal Cipher
- Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
- Tweaking Even-Mansour Ciphers
- Integral Cryptanalysis on Full MISTY1
- Cube Attacks on Tweakable Black Box Polynomials
- Bit-Based Division Property and Application to Simon Family
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- New Impossible Differential Attacks on AES
- New AES Software Speed Records
- A New Structural-Differential Property of 5-Round AES
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
This page was built for publication: TNT: how to tweak a block cipher