tweakey

From MaRDI portal
Software:24740



swMATH12816MaRDI QIDQ24740


No author found.





Related Items (36)

Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacksOn the resilience of Even-Mansour to invariant permutationsImpossible Differential Cryptanalysis of Reduced-Round Tweakable TWINEeSPF: A Family of Format-Preserving Encryption Algorithms Using MDS MatricesTweaking Even-Mansour Ciphers\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryptionTweak-Length Extension for Tweakable BlockciphersRelated-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3Pholkos -- efficient large-state tweakable block ciphers from the AES round functionKey guessing strategies for linear key-schedule algorithms in rectangle attacksConnecting tweakable and multi-key blockcipher securityGeneralized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFTTight security of cascaded LRW2Efficient and Provable White-Box PrimitivesStatistical Fault Attacks on Nonce-Based Authenticated Encryption SchemesHow to Build Fully Secure Tweakable Blockciphers from Classical BlockciphersTowards closing the security gap of Tweak-aNd-Tweak (TNT)Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipherThe State of the Authenticated EncryptionImpossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BCBiclique Attack of Block Cipher SKINNYSPF: A New Family of Efficient Format-Preserving Encryption Algorithms\textsc{POEx}: a beyond-birthday-bound-secure on-line cipherKey recovery attacks on reduced-round Joltik-BC in the single-key settingTweaking a block cipher: multi-user beyond-birthday-bound security in the standard modelAnalysis of the CAESAR Candidate SilverThe \texttt{Deoxys} AEAD familyBiased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY}Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal StretchAuthenticated Encryption with Small Stretch (or, How to Accelerate AERO)Impossible Differential Cryptanalysis of Reduced-Round SKINNYSquare Attack on 7-Round Kiasu-BCThe SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTISThe MALICIOUS framework: embedding backdoors into tweakable block ciphersTNT: how to tweak a block cipherLightweight authenticated encryption mode suitable for threshold implementation


This page was built for software: tweakey