Key recovery attacks on iterated Even-Mansour encryption schemes (Q321305): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
Normalize DOI.
 
(8 intermediate revisions by 6 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s00145-015-9207-3 / rank
Normal rank
 
Property / describes a project that uses
 
Property / describes a project that uses: NOEKEON / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: CRYPTON / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: LED / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s00145-015-9207-3 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2130566903 / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q121336330 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Indifferentiability of Key-Alternating Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Preimage Attacks on One-Block MD4, 63-Step MD5 and More / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941816 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Biclique Cryptanalysis of the Full AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tight Security Bounds for Key-Alternating Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Limitations of the Even-Mansour construction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Minimalism in Cryptography: The Even-Mansour Scheme Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: A construction of a cipher from a single pseudorandom permutation. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3973158 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3549563 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Block Ciphers That Are Easier to Mask: How Far Can We Go? / rank
 
Normal rank
Property / cites work
 
Property / cites work: The LED Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: A cryptanalytic time-memory trade-off / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Cryptology - ICISC 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast software encryption. 6th international workshop, FSE `99. Rome, Italy, March 24--26, 1999. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Construct an Ideal Cipher from a Small Set of Public Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941801 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Differential Analysis of the LED Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4537987 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Round-Reduced $$\mathtt{LED}$$ / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934709 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15--19, 2012. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4943606 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1--5, 2013. Proceedings, Part I / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2--6, 2012. Proceedings / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S00145-015-9207-3 / rank
 
Normal rank

Latest revision as of 14:20, 9 December 2024

scientific article
Language Label Description Also known as
English
Key recovery attacks on iterated Even-Mansour encryption schemes
scientific article

    Statements

    Key recovery attacks on iterated Even-Mansour encryption schemes (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    13 October 2016
    0 references
    cryptanalysis
    0 references
    key recovery attacks
    0 references
    iterated Even-Mansour
    0 references
    LED block cipher
    0 references
    \(\mathrm{AES}^2\) block cipher
    0 references
    backdoors in cryptography
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers