Tight security for key-alternating ciphers with correlated sub-keys
From MaRDI portal
Publication:6157557
DOI10.1007/978-3-030-92078-4_15zbMath1514.94132OpenAlexW3217479319MaRDI QIDQ6157557
Publication date: 12 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-92078-4_15
Related Items (2)
BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers ⋮ Minimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules)
Cites Work
- Unnamed Item
- Unnamed Item
- A construction of a cipher from a single pseudorandom permutation.
- Minimizing the two-round tweakable Even-Mansour cipher
- Tight security analysis of 3-round key-alternating cipher with a single permutation
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
- Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security
- Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions
- Minimizing the Two-Round Even-Mansour Cipher
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited
- On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks
- The LED Block Cipher
- Tweaking Even-Mansour Ciphers
- PRESENT: An Ultra-Lightweight Block Cipher
- Testing triangle-freeness in general graphs
- The “Coefficients H” Technique
- An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher
- Tight Security Bounds for Key-Alternating Ciphers
This page was built for publication: Tight security for key-alternating ciphers with correlated sub-keys