Minimizing the Two-Round Even-Mansour Cipher
From MaRDI portal
Publication:2874495
DOI10.1007/978-3-662-44371-2_3zbMath1317.94095OpenAlexW114757832MaRDI QIDQ2874495
Jooyoung Lee, Shan Chen, Yannick Seurin, John P. Steinberger, Rodolphe Lampe
Publication date: 7 August 2014
Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-44371-2_3
indistinguishabilityrandom permutation modelkey-alternating cipherpseudorandom permutationgeneralized Even-Mansour ciphersum-capture problem
Related Items (29)
How to build an ideal cipher: the indifferentiability of the Feistel construction ⋮ The key-dependent message security of key-alternating Feistel ciphers ⋮ On the resilience of Even-Mansour to invariant permutations ⋮ BBB Secure Nonce Based MAC Using Public Permutations ⋮ Towards tight security of cascaded LRW2 ⋮ The \(t\)-wise independence of substitution-permutation networks ⋮ Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour ⋮ Connecting tweakable and multi-key blockcipher security ⋮ Cryptanalysis of the Full 8.5-Round REESSE3+ Block Cipher ⋮ Open problems in hash function security ⋮ Beyond-birthday secure domain-preserving PRFs from a single permutation ⋮ Quantum key recovery attacks on tweakable Even-Mansour ciphers ⋮ Multi-user security bound for filter permutators in the random oracle model ⋮ A modular approach to the security analysis of two-permutation constructions ⋮ Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers ⋮ BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers ⋮ Tight security for key-alternating ciphers with correlated sub-keys ⋮ Provably secure reflection ciphers ⋮ Provable security against generic attacks on stream ciphers ⋮ Minimizing the two-round tweakable Even-Mansour cipher ⋮ Tight security analysis of 3-round key-alternating cipher with a single permutation ⋮ Strengthening the Known-Key Security Notion for Block Ciphers ⋮ Key alternating ciphers based on involutions ⋮ On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks ⋮ On the XOR of Multiple Random Permutations ⋮ Analysis of the single-permutation encrypted Davies-Meyer construction ⋮ Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security ⋮ XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees ⋮ EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
This page was built for publication: Minimizing the Two-Round Even-Mansour Cipher