Tweaks and Keys for Block Ciphers: The TWEAKEY Framework

From MaRDI portal
Publication:2936613

DOI10.1007/978-3-662-45608-8_15zbMath1317.94113OpenAlexW1958084802MaRDI QIDQ2936613

Ivica Nikolić, Thomas Peyrin, Jérémy Jean

Publication date: 6 January 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-45608-8_15




Related Items (57)

Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeysMeet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacksOn the resilience of Even-Mansour to invariant permutationsImpossible Differential Cryptanalysis of Reduced-Round Tweakable TWINEeSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryptionTweak-Length Extension for Tweakable BlockciphersRelated-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3Pholkos -- efficient large-state tweakable block ciphers from the AES round functionKey guessing strategies for linear key-schedule algorithms in rectangle attacksImproved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128Exploring lightweight efficiency of ForkAESConnecting tweakable and multi-key blockcipher securityGeneralized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFTTight security of cascaded LRW2Truncated boomerang attacks and application to AES-based ciphersFinding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacksSuperposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashingKey structures: improved related-key boomerang attack against the full AES-256Implementing Grover oracle for lightweight block ciphers under depth constraintsSecret can be public: low-memory AEAD mode for high-order maskingEfficient and Provable White-Box PrimitivesStatistical Fault Attacks on Nonce-Based Authenticated Encryption SchemesHow to Build Fully Secure Tweakable Blockciphers from Classical BlockciphersMind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}Optimizing rectangle attacks: a unified and generic framework for key recoveryDifferential meet-in-the-middle cryptanalysisEfficient leakage-resilient MACs without idealized assumptionsTransciphering framework for approximate homomorphic encryption\textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipherOn the Efficiency of ZMAC-Type ModesOffset-based BBB-secure tweakable block-ciphers with updatable cachesWeak subtweakeys in SKINNYTowards closing the security gap of Tweak-aNd-Tweak (TNT)Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipherImpossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BCBiclique Attack of Block Cipher SKINNYSPF: A New Family of Efficient Format-Preserving Encryption AlgorithmsVariants of the AES key schedule for better truncated differential boundsMind the gap -- a closer look at the security of block ciphers against differential cryptanalysisTweaking key-alternating Feistel block ciphers\textsc{POEx}: a beyond-birthday-bound-secure on-line cipherKey recovery attacks on reduced-round Joltik-BC in the single-key settingTweaking a block cipher: multi-user beyond-birthday-bound security in the standard modelAnalysis of the CAESAR Candidate SilverThe \texttt{Deoxys} AEAD familyBiased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY}Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal StretchAuthenticated Encryption with Small Stretch (or, How to Accelerate AERO)Impossible Differential Cryptanalysis of Reduced-Round SKINNYSquare Attack on 7-Round Kiasu-BCtweakeyThe SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTISCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersThe MALICIOUS framework: embedding backdoors into tweakable block ciphersTNT: how to tweak a block cipherLightweight authenticated encryption mode suitable for threshold implementation




This page was built for publication: Tweaks and Keys for Block Ciphers: The TWEAKEY Framework