On the sequential indifferentiability of the Lai-Massey construction
From MaRDI portal
Publication:6544470
DOI10.1007/s10623-024-01361-6zbMATH Open1540.94064MaRDI QIDQ6544470
Chun Guo, Chenyu Xiao, Yiyuan Luo
Publication date: 27 May 2024
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Cites Work
- Title not available (Why is that?)
- How to build an ideal cipher: the indifferentiability of the Feistel construction
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour
- Generic attacks on the Lai-Massey scheme
- On Lai-Massey and quasi-Feistel ciphers
- Indifferentiable authenticated encryption
- Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: five rounds are necessary and sufficient
- Pseudorandomness analysis of the (extended) Lai-Massey scheme
- Minimizing the two-round Even-Mansour cipher
- Mind the middle layer: the HADES design strategy revisited
- Indifferentiability of truncated random permutations
- A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
- Indifferentiability of 8-Round Feistel Networks
- On the Indifferentiability of Key-Alternating Ciphers
- How to Construct an Ideal Cipher from a Small Set of Public Permutations
- On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
- Ciphers for MPC and FHE
- On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks
- Careful with Composition: Limitations of the Indifferentiability Framework
- The random oracle methodology, revisited
- Distinguisher and Related-Key Attack on the Full AES-256
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- The Wide Trail Design Strategy
- Strengthening the Known-Key Security Notion for Block Ciphers
- Resource-Restricted Indifferentiability
- On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
- Known-Key Distinguishers for Some Block Ciphers
- Merkle-Damgård Revisited: How to Construct a Hash Function
- Selected Areas in Cryptography
- 10-Round Feistel is Indifferentiable from an Ideal Cipher
- Indifferentiability of Confusion-Diffusion Networks
- Theory of Cryptography
- Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls
- Quantum attacks on Lai-Massey structure
This page was built for publication: On the sequential indifferentiability of the Lai-Massey construction
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6544470)