Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
From MaRDI portal
Publication:2938858
DOI10.1007/978-3-662-45611-8_23zbMath1306.94048OpenAlexW1831474958MaRDI QIDQ2938858
Adi Shamir, Itai Dinur, Nathan Keller, Orr Dunkelman
Publication date: 16 January 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-45611-8_23
Related Items (7)
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour ⋮ Key recovery attacks on iterated Even-Mansour encryption schemes ⋮ Beyond quadratic speedups in quantum attacks on symmetric schemes ⋮ Minimizing the two-round Even-Mansour cipher ⋮ Quantum algorithm for the multicollision problem ⋮ Beyond conventional security in sponge-based authenticated encryption modes
Uses Software
This page was built for publication: Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys