tweakey
From MaRDI portal
Software:24740
No author found.
Related Items (36)
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ On the resilience of Even-Mansour to invariant permutations ⋮ Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE ⋮ eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices ⋮ Tweaking Even-Mansour Ciphers ⋮ \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption ⋮ Tweak-Length Extension for Tweakable Blockciphers ⋮ Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3 ⋮ Pholkos -- efficient large-state tweakable block ciphers from the AES round function ⋮ Key guessing strategies for linear key-schedule algorithms in rectangle attacks ⋮ Connecting tweakable and multi-key blockcipher security ⋮ Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT ⋮ Tight security of cascaded LRW2 ⋮ Efficient and Provable White-Box Primitives ⋮ Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes ⋮ How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers ⋮ Towards closing the security gap of Tweak-aNd-Tweak (TNT) ⋮ Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher ⋮ The State of the Authenticated Encryption ⋮ Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC ⋮ Biclique Attack of Block Cipher SKINNY ⋮ SPF: A New Family of Efficient Format-Preserving Encryption Algorithms ⋮ \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher ⋮ Key recovery attacks on reduced-round Joltik-BC in the single-key setting ⋮ Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model ⋮ Analysis of the CAESAR Candidate Silver ⋮ The \texttt{Deoxys} AEAD family ⋮ Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY} ⋮ Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch ⋮ Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) ⋮ Impossible Differential Cryptanalysis of Reduced-Round SKINNY ⋮ Square Attack on 7-Round Kiasu-BC ⋮ The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS ⋮ The MALICIOUS framework: embedding backdoors into tweakable block ciphers ⋮ TNT: how to tweak a block cipher ⋮ Lightweight authenticated encryption mode suitable for threshold implementation
This page was built for software: tweakey