On the resilience of Even-Mansour to invariant permutations (Q831175): Difference between revisions

From MaRDI portal
Changed an Item
Normalize DOI.
 
(11 intermediate revisions by 5 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s10623-021-00850-2 / rank
Normal rank
 
Property / describes a project that uses
 
Property / describes a project that uses: NOEKEON / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Midori / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Gimli / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Salsa20 / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Chaskey / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: ChaCha / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Keccak / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s10623-021-00850-2 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3130355687 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A practical attack on KeeLoq / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of Keyed Sponge Constructions Using a Modular Proof Approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: Inside the Hypercube / rank
 
Normal rank
Property / cites work
 
Property / cites work: NORX: Parallel and Scalable AEAD / rank
 
Normal rank
Property / cites work
 
Property / cites work: BLAKE2: Simpler, Smaller, Fast as MD5 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Midori: A Block Cipher for Low Energy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient slide attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: In How Many Ways Can You Write Rijndael? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proving resistance against invariant attacks: how to choose the round constants / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in cryptology -- CT-RSA 2014. The cryptographer's track at the RSA conference 2014, San Francisco, CA, USA, February 25--28, 2014. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Keccak / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Indifferentiability of the Sponge Construction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Block cipher invariants as eigenvectors of correlation matrices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941816 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: On defining sets for projective planes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Another Look at Complementation Properties / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short codes with a given covering radius / rank
 
Normal rank
Property / cites work
 
Property / cites work: Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Salsa20 Core Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Minimizing the Two-Round Even-Mansour Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tight Security Bounds for Key-Alternating Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sum-free sets in vector spaces over \(GF(2)\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweaking Even-Mansour Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4342497 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Full-state keyed duplex with built-in multi-user support / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4537988 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructions and families of covering codes and saturated sets of points in projective geometry / rank
 
Normal rank
Property / cites work
 
Property / cites work: Minimal 1-saturating sets and complete caps in binary projective spaces. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Ascon / rank
 
Normal rank
Property / cites work
 
Property / cites work: Minimalism in Cryptography: The Even-Mansour Scheme Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Almost universal forgery attacks on AES-based MAC's / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4314029 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Related-Key Security of Iterated Even–Mansour Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Birthday paradox, coupon collectors, caching algorithms and self- organizing search / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear codes with covering radius 2 and other new covering codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC / rank
 
Normal rank
Property / cites work
 
Property / cites work: The geometry of covering codes: small complete caps and saturating sets in Galois spaces / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simpira v2: A Family of Efficient Permutations Using the AES Round Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analysis of BLAKE2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The PHOTON Family of Lightweight Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robust Authenticated-Encryption AEZ and the Problem That It Solves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweaks and Keys for Block Ciphers: The TWEAKEY Framework / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Cryptanalysis of PAES / rank
 
Normal rank
Property / cites work
 
Property / cites work: PRINTcipher: A Block Cipher for IC-Printing / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Software Performance of Authenticated-Encryption Modes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8--11, 2015. Revised selected papers / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro / rank
 
Normal rank
Property / cites work
 
Property / cites work: Connecting tweakable and multi-key blockcipher security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409107 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Progress in Cryptology - INDOCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Iterated Random Permutation Problem with Applications to Cascade Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-key Security: The Even-Mansour Construction Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4871720 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The “Coefficients H” Technique / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Differential Attacks for ECHO and Grøstl / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14--18, 2011. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: CBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Nonlinear Invariant Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Saturated configurations of points in projective Galois spaces / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advanced Encryption Standard – AES / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S10623-021-00850-2 / rank
 
Normal rank

Latest revision as of 04:28, 10 December 2024

scientific article
Language Label Description Also known as
English
On the resilience of Even-Mansour to invariant permutations
scientific article

    Statements

    On the resilience of Even-Mansour to invariant permutations (English)
    0 references
    0 references
    0 references
    10 May 2021
    0 references
    permutation
    0 references
    invariances
    0 references
    security analysis
    0 references
    indistinguishability
    0 references
    attacks
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers