Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - MaRDI portal

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations

From MaRDI portal
Publication:2894400

DOI10.1007/978-3-642-29011-4_5zbMath1290.94044OpenAlexW1744216657MaRDI QIDQ2894400

John P. Steinberger, Gregor Leander, Elmar Tischhauser, Andrey Bogdanov, Lars R. Knudsen, François-Xavier Standaert

Publication date: 29 June 2012

Published in: Advances in Cryptology – EUROCRYPT 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-29011-4_5




Related Items (38)

How to build an ideal cipher: the indifferentiability of the Feistel constructionOptimum attack on 3-round Feistel-2 structureOn the resilience of Even-Mansour to invariant permutationsBBB Secure Nonce Based MAC Using Public PermutationsTowards tight security of cascaded LRW2The \(t\)-wise independence of substitution-permutation networksSeparating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-MansourTweaking Even-Mansour CiphersKey recovery attacks on iterated Even-Mansour encryption schemesConnecting tweakable and multi-key blockcipher securityCryptanalysis of Round-Reduced $$\mathtt{LED}$$Tweakable Blockciphers with Asymptotically Optimal SecurityTowards Understanding the Known-Key Security of Block CiphersSecurity analysis of Even-Mansour structure hash functionsKeyed sum of permutations: a simpler RP-based PRFTight security of cascaded LRW2Impossibility of indifferentiable iterated blockciphers from 3 or less primitive callsSalvaging Weak Security Bounds for Blockcipher-Based ConstructionsA modular approach to the security analysis of two-permutation constructionsLayout graphs, random walks and the \(t\)-wise independence of SPN block ciphersTight security for key-alternating ciphers with correlated sub-keysProvably secure reflection ciphersDesigning tweakable enciphering schemes using public permutationsMinimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules)Quantum attacks on PRFs based on public random permutationsProvable security against generic attacks on stream ciphersMinimizing the two-round tweakable Even-Mansour cipherTight security analysis of 3-round key-alternating cipher with a single permutationAKF: a key alternating Feistel scheme for lightweight cipher designsStrengthening the Known-Key Security Notion for Block CiphersImproving the security and efficiency of block ciphers based on LS-designsOn stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacksMinimizing the two-round Even-Mansour cipherGeneric attacks on the Lai-Massey schemeThe Multi-user Security of Double EncryptionSlidex attacks on the Even-Mansour encryption schemeKey-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user SecurityXPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees


Uses Software





This page was built for publication: Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations