Towards closing the security gap of Tweak-aNd-Tweak (TNT)
From MaRDI portal
Publication:2692356
DOI10.1007/978-3-030-64837-4_19OpenAlexW3113330072MaRDI QIDQ2692356
Ling Song, Jian Guo, Eik List, Chun Guo
Publication date: 21 March 2023
Full work available at URL: https://doi.org/10.1007/978-3-030-64837-4_19
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Generic attack on iterated tweakable FX constructions
- Universal classes of hash functions
- Towards tight security of cascaded LRW2
- Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model
- Generic attacks against beyond-birthday-bound MACs
- ZMAC: a fast tweakable block cipher mode for highly secure message authentication
- Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory
- Rigorous upper bounds on data complexities of block cipher cryptanalysis
- TNT: how to tweak a block cipher
- Blockcipher-based authenticated encryption: how small can we go?
- Tight security of cascaded LRW2
- XHX -- a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Optimally Secure Tweakable Blockciphers
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
- The Software Performance of Authenticated-Encryption Modes
- Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher
- PRESENT: An Ultra-Lightweight Block Cipher
- The “Coefficients H” Technique
- Blockcipher-Based Authenticated Encryption: How Small Can We Go?
- Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
- Fast Software Encryption
- On the Efficiency of ZMAC-Type Modes
This page was built for publication: Towards closing the security gap of Tweak-aNd-Tweak (TNT)