Tweaking Even-Mansour Ciphers
From MaRDI portal
Publication:3457110
DOI10.1007/978-3-662-47989-6_9zbMath1369.94526OpenAlexW2204642948MaRDI QIDQ3457110
Benoît Cogliati, Rodolphe Lampe, Yannick Seurin
Publication date: 10 December 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-47989-6_9
key-alternating ciphercoupling techniquetweakable block cipherEven-Mansour constructionCLRW constructionH-coefficients technique
Related Items (23)
On the resilience of Even-Mansour to invariant permutations ⋮ Towards tight security of cascaded LRW2 ⋮ Tweak-Length Extension for Tweakable Blockciphers ⋮ Connecting tweakable and multi-key blockcipher security ⋮ Quantum key recovery attacks on tweakable Even-Mansour ciphers ⋮ Tight security of cascaded LRW2 ⋮ Adaptively code-correlation robustness functions and its applications to private set intersection ⋮ Simpira v2: A Family of Efficient Permutations Using the AES Round Function ⋮ How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers ⋮ A modular approach to the security analysis of two-permutation constructions ⋮ BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers ⋮ Tight security for key-alternating ciphers with correlated sub-keys ⋮ \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher ⋮ Output masking of tweakable Even-Mansour can be eliminated for message authentication code ⋮ Minimizing the two-round tweakable Even-Mansour cipher ⋮ Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher ⋮ Tweaking key-alternating Feistel block ciphers ⋮ Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications ⋮ An observation on NORX, BLAKE2, and ChaCha ⋮ Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model ⋮ Beyond conventional security in sponge-based authenticated encryption modes ⋮ XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees ⋮ TNT: how to tweak a block cipher
Uses Software
Cites Work
- A construction of a cipher from a single pseudorandom permutation.
- On the Indifferentiability of Key-Alternating Ciphers
- Parallelizable and Authenticated Online Ciphers
- How to Construct an Ideal Cipher from a Small Set of Public Permutations
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- Online Ciphers from Tweakable Blockciphers
- How to Encipher Messages on a Small Domain
- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher
- On Generalized Feistel Networks
- The “Coefficients H” Technique
- An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher
- On Tweaking Luby-Rackoff Blockciphers
- Tight Security Bounds for Key-Alternating Ciphers
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
This page was built for publication: Tweaking Even-Mansour Ciphers