On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
From MaRDI portal
Publication:3013081
DOI10.1007/978-3-642-21702-9_8zbMath1282.94030OpenAlexW1223230236MaRDI QIDQ3013081
Kenneth G. Paterson, Gaven J. Watson, Pooya Farshim, Martin R. Albrecht
Publication date: 7 July 2011
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-21702-9_8
Related Items (10)
Connecting tweakable and multi-key blockcipher security ⋮ A quantum related-key attack based on the Bernstein-Vazirani algorithm ⋮ On the related-key attack security of authenticated encryption schemes ⋮ Output masking of tweakable Even-Mansour can be eliminated for message authentication code ⋮ A note on quantum related-key attacks ⋮ On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model ⋮ Reflection ciphers ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ Clever Arbiters Versus Malicious Adversaries ⋮ XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- New types of cryptanalytic attacks using related keys
- On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
- The random oracle methodology, revisited
- Distinguisher and Related-Key Attack on the Full AES-256
- On Related-Secret Pseudorandomness
- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers
- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Fast Software Encryption
- Fast Software Encryption
This page was built for publication: On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model