Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes
From MaRDI portal
Publication:3194586
DOI10.1007/978-3-319-19962-7_1zbMath1356.94083OpenAlexW1137145129MaRDI QIDQ3194586
Zhelei Sun, Peng Wang, Liting Zhang
Publication date: 20 October 2015
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-19962-7_1
Related Items (2)
RIV for Robust Authenticated Encryption ⋮ Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Tweakable block ciphers
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- New types of cryptanalytic attacks using related keys
- On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes
- Secure Message Authentication Against Related-Key Attack
- An Improved Security Bound for HCTR
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation
- Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
- Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions
- Related-Key Boomerang and Rectangle Attacks
- Advances in Cryptology - CRYPTO 2003
- The Security of the Extended Codebook (XCB) Mode of Operation
- Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Progress in Cryptology - INDOCRYPT 2004
- Information Security and Cryptology
- Topics in Cryptology – CT-RSA 2004
- Fast Software Encryption
This page was built for publication: Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes