Minimizing the two-round tweakable Even-Mansour cipher
From MaRDI portal
Publication:2692357
DOI10.1007/978-3-030-64837-4_20OpenAlexW3091546435MaRDI QIDQ2692357
Publication date: 21 March 2023
Full work available at URL: https://doi.org/10.1007/978-3-030-64837-4_20
Related Items (6)
A modular approach to the security analysis of two-permutation constructions ⋮ BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers ⋮ Tight security for key-alternating ciphers with correlated sub-keys ⋮ Designing tweakable enciphering schemes using public permutations ⋮ Minimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules) ⋮ Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A new multi-linear universal hash family
- Towards tight security of cascaded LRW2
- Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model
- Tweakable HCTR: a BBB secure tweakable enciphering scheme
- On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Parallelizable and Authenticated Online Ciphers
- Minimizing the Two-Round Even-Mansour Cipher
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- Tweakable Blockciphers with Asymptotically Optimal Security
- The Related-Key Security of Iterated Even–Mansour Ciphers
- Optimally Secure Tweakable Blockciphers
- On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks
- Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption
- Online Ciphers from Tweakable Blockciphers
- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher
- Tweaking Even-Mansour Ciphers
- Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher
- The “Coefficients H” Technique
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- On Tweaking Luby-Rackoff Blockciphers
- Tight Security Bounds for Key-Alternating Ciphers
- Advances in Cryptology - CRYPTO 2003
- Improved Security Analysis of XEX and LRW Modes
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
- Information Security and Cryptology
- Topics in Cryptology – CT-RSA 2004
This page was built for publication: Minimizing the two-round tweakable Even-Mansour cipher