Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security (Q2835581): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-662-53018-4_1 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2477309039 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Indifferentiability of Key-Alternating Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374913 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Format-Preserving Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to stretch random functions: The security of protected counter sums / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Minimizing the Two-Round Even-Mansour Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tight Security Bounds for Key-Alternating Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of Multiple Encryption in the Ideal Cipher Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Minimalism in Cryptography: The Even-Mansour Scheme Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4314029 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A construction of a cipher from a single pseudorandom permutation. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cascade Encryption Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Protect DES Against Exhaustive Key Search / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737239 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-key Security: The Even-Mansour Construction Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Simple and Unified Method of Proving Indistinguishability / rank
 
Normal rank
Property / cites work
 
Property / cites work: The “Coefficients H” Technique / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimally Secure Block Ciphers from Ideal Primitives / rank
 
Normal rank

Latest revision as of 00:04, 13 July 2024

scientific article
Language Label Description Also known as
English
Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security
scientific article

    Statements

    Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security (English)
    0 references
    0 references
    0 references
    30 November 2016
    0 references
    symmetric cryptography
    0 references
    block ciphers
    0 references
    provable security
    0 references
    tightness
    0 references
    multi-user security
    0 references
    0 references
    0 references
    0 references

    Identifiers