Tight security of cascaded LRW2 (Q2188969): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(5 intermediate revisions by 3 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: POEx / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: SKINNY / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: tweakey / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s00145-020-09347-y / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3009811602 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweakable block ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Software Performance of Authenticated-Encryption Modes / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Modular Framework for Building Variable-Input-Length Tweakable Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Parallelizable and Authenticated Online Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweaks and Keys for Block Ciphers: The TWEAKEY Framework / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robust Authenticated-Encryption AEZ and the Problem That It Solves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: ZMAC: a fast tweakable block cipher mode for highly secure message authentication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweaking Even-Mansour Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Beyond-Birthday-Bound Security Based on Tweakable Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Online Ciphers from Tweakable Blockciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweakable HCTR: a BBB secure tweakable enciphering scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls / rank
 
Normal rank
Property / cites work
 
Property / cites work: The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS / rank
 
Normal rank
Property / cites work
 
Property / cites work: A General Construction of Tweakable Block Ciphers and Different Modes of Operations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Security Analysis of XEX and LRW Modes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweakable Blockciphers with Beyond Birthday-Bound Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweakable Blockciphers with Asymptotically Optimal Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards tight security of cascaded LRW2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimally Secure Tweakable Blockciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: XHX -- a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Mirror theory and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Feistel Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information-theoretic indistinguishability via the chi-squared method / rank
 
Normal rank
Property / cites work
 
Property / cites work: Encrypt or decrypt -- to make a single-key beyond birthday secure nonce-based MAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Multi-user Security of Double Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4871720 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249345 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4940691 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bucket hashing and its application to fast message authentication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Parallelizable MACs based on the sum of PRPs with security beyond the birthday bound / rank
 
Normal rank
Property / cites work
 
Property / cites work: Beyond birthday bound secure MAC in faulty nonce model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic attacks against beyond-birthday-bound MACs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foiling Birthday Attacks in Length-Doubling Transformations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Cryptology - ICISC 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Proof of Security in O(2 n ) for the Benes Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Variant of PMAC: Beyond the Birthday Bound / rank
 
Normal rank
Property / cites work
 
Property / cites work: Blockcipher-based MACs: beyond the birthday bound without message length / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweak-Length Extension for Tweakable Blockciphers / rank
 
Normal rank

Latest revision as of 21:51, 22 July 2024

scientific article
Language Label Description Also known as
English
Tight security of cascaded LRW2
scientific article

    Statements

    Tight security of cascaded LRW2 (English)
    0 references
    0 references
    0 references
    15 June 2020
    0 references
    LRW2
    0 references
    CLRW2
    0 references
    tweakable block cipher
    0 references
    mirror theory
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers