Minimizing the Two-Round Even-Mansour Cipher

From MaRDI portal
Publication:2874495

DOI10.1007/978-3-662-44371-2_3zbMath1317.94095OpenAlexW114757832MaRDI QIDQ2874495

Jooyoung Lee, Shan Chen, Yannick Seurin, John P. Steinberger, Rodolphe Lampe

Publication date: 7 August 2014

Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-44371-2_3




Related Items (29)

How to build an ideal cipher: the indifferentiability of the Feistel constructionThe key-dependent message security of key-alternating Feistel ciphersOn the resilience of Even-Mansour to invariant permutationsBBB Secure Nonce Based MAC Using Public PermutationsTowards tight security of cascaded LRW2The \(t\)-wise independence of substitution-permutation networksSeparating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-MansourConnecting tweakable and multi-key blockcipher securityCryptanalysis of the Full 8.5-Round REESSE3+ Block CipherOpen problems in hash function securityBeyond-birthday secure domain-preserving PRFs from a single permutationQuantum key recovery attacks on tweakable Even-Mansour ciphersMulti-user security bound for filter permutators in the random oracle modelA modular approach to the security analysis of two-permutation constructionsLayout graphs, random walks and the \(t\)-wise independence of SPN block ciphersBBB security for 5-round even-Mansour-based key-alternating Feistel ciphersTight security for key-alternating ciphers with correlated sub-keysProvably secure reflection ciphersProvable security against generic attacks on stream ciphersMinimizing the two-round tweakable Even-Mansour cipherTight security analysis of 3-round key-alternating cipher with a single permutationStrengthening the Known-Key Security Notion for Block CiphersKey alternating ciphers based on involutionsOn stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacksOn the XOR of Multiple Random PermutationsAnalysis of the single-permutation encrypted Davies-Meyer constructionKey-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user SecurityXPX: Generalized Tweakable Even-Mansour with Improved Security GuaranteesEWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC







This page was built for publication: Minimizing the Two-Round Even-Mansour Cipher