Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Minimalism in Cryptography: The Even-Mansour Scheme Revisited - MaRDI portal

Minimalism in Cryptography: The Even-Mansour Scheme Revisited

From MaRDI portal
Publication:2894417

DOI10.1007/978-3-642-29011-4_21zbMath1297.94065OpenAlexW1810232834MaRDI QIDQ2894417

Orr Dunkelman, Nathan Keller, Adi Shamir

Publication date: 29 June 2012

Published in: Advances in Cryptology – EUROCRYPT 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-29011-4_21




Related Items (41)

On the resilience of Even-Mansour to invariant permutationsTweaking Even-Mansour CiphersThe Iterated Random Permutation Problem with Applications to Cascade EncryptionThe Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBCKey recovery attacks on iterated Even-Mansour encryption schemesBeyond quadratic speedups in quantum attacks on symmetric schemesPost-quantum security of the Even-Mansour cipherConnecting tweakable and multi-key blockcipher securitySecurity Analysis of PRINCECryptanalysis of Round-Reduced $$\mathtt{LED}$$\(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutationsSecurity analysis of Even-Mansour structure hash functionsReflections on slide with a twist attacksKeyed sum of permutations: a simpler RP-based PRFCryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problemMeet-in-the-middle attacks and structural analysis of round-reduced PRINCEFrom Farfalle to \textsc{Megafono} via Ciminion: the PRF \textsc{Hydra} for MPC applicationsSimpira v2: A Family of Efficient Permutations Using the AES Round FunctionHow to Build Fully Secure Tweakable Blockciphers from Classical BlockciphersA New Algorithm for the Unbalanced Meet-in-the-Middle ProblemTight security for key-alternating ciphers with correlated sub-keysProvably secure reflection ciphersMinimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules)Provable security against generic attacks on stream ciphersAn efficient affine equivalence algorithm for multiple S-boxes and a structured affine layerOutput masking of tweakable Even-Mansour can be eliminated for message authentication codePublicly verifiable zero-knowledge and post-quantum signatures from VOLE-in-the-headTight security analysis of 3-round key-alternating cipher with a single permutationA compress slide attack on the full GOST block cipherAKF: a key alternating Feistel scheme for lightweight cipher designsRotational cryptanalysis on MAC algorithm chaskeyStrengthening the Known-Key Security Notion for Block CiphersKey alternating ciphers based on involutionsOn stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacksMinimizing the two-round Even-Mansour cipherCryptography from the tropical Hessian pencilSlidex attacks on the Even-Mansour encryption schemeReflection cryptanalysis of PRINCE-like ciphersKey-Recovery Attacks Against the MAC Algorithm ChaskeyKey-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user SecurityXPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees




This page was built for publication: Minimalism in Cryptography: The Even-Mansour Scheme Revisited