Two practical and provably secure block ciphers: BEAR and LION
From MaRDI portal
Publication:4593789
DOI10.1007/3-540-60865-6_48zbMath1373.94908OpenAlexW1490586645MaRDI QIDQ4593789
Publication date: 15 November 2017
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-60865-6_48
Related Items
Related-key analysis of generalized Feistel networks with expanding round functions, The key-dependent message security of key-alternating Feistel ciphers, Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique, Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256, Attacking BEAR and LION Schemes in a Realistic Scenario, Simpira v2: A Family of Efficient Permutations Using the AES Round Function, On the provable security of BEAR and LION schemes, Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions, Cryptanalysis of Ladder-DES, All-or-nothing encryption and the package transform, On the security of remotely keyed encryption, RIV for Robust Authenticated Encryption, A randomness test for block ciphers, Provable related-key security of contracting Feistel networks, Building Secure Block Ciphers on Generic Attacks Assumptions