Format-Preserving Encryption
From MaRDI portal
Publication:3651265
DOI10.1007/978-3-642-05445-7_19zbMath1267.94037OpenAlexW1673464365MaRDI QIDQ3651265
Till Stegers, Thomas Ristenpart, Mihir Bellare, Phillip Rogaway
Publication date: 9 December 2009
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-05445-7_19
Related Items (27)
Linear cryptanalysis of FF3-1 and FEA ⋮ Related-key analysis of generalized Feistel networks with expanding round functions ⋮ Format-preserving encryption: a survey ⋮ eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices ⋮ Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption ⋮ Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes ⋮ Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers ⋮ Several proofs of security for a tokenization algorithm ⋮ Partition and mix: generalizing the swap-or-not shuffle ⋮ Targeted invertible pseudorandom functions and deterministic format-transforming encryption ⋮ Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more ⋮ Reverse Cycle Walking and Its Applications ⋮ New algorithms and analyses for sum-preserving encryption ⋮ FAST: secure and high performance format-preserving encryption and tokenization ⋮ SPF: A New Family of Efficient Format-Preserving Encryption Algorithms ⋮ Targeted ciphers for format-preserving encryption ⋮ Deterministic encryption with the Thorp shuffle ⋮ The Multi-user Security of Double Encryption ⋮ An efficient format-preserving encryption mode for practical domains ⋮ Building blockcipher from small-block tweakable blockcipher ⋮ Online Ciphers from Tweakable Blockciphers ⋮ Three third generation attacks on the format preserving encryption scheme FF3 ⋮ Provable related-key security of contracting Feistel networks ⋮ PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers ⋮ Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal ⋮ Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security ⋮ Modifying an Enciphering Scheme After Deployment
This page was built for publication: Format-Preserving Encryption