Connecting tweakable and multi-key blockcipher security (Q2413014): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / Wikidata QID
 
Property / Wikidata QID: Q59606821 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Indifferentiability of Key-Alternating Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Parallelizable and Authenticated Online Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of Keyed Sponge Constructions Using a Modular Proof Approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374913 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hash-Function Based PRFs: AMAC and Its Multi-User Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341758 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key agreement protocols and their security analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434895 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Time-Memory Trade-Offs with Multiple Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341751 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Selected areas in cryptography. 13th international workshop, SAC 2006, Montreal, Canada, August 17--18, 2006. Revised selected papers. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Minimizing the Two-Round Even-Mansour Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweaking Even-Mansour Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Another Look at Tightness / rank
 
Normal rank
Property / cites work
 
Property / cites work: A General Construction of Tweakable Block Ciphers and Different Modes of Operations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tight Security Bounds for Key-Alternating Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Limitations of the Even-Mansour construction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Minimalism in Cryptography: The Even-Mansour Scheme Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: ELmE: A Misuse Resistant Parallel Authenticated Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Wide Trail Design Strategy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4314029 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A construction of a cipher from a single pseudorandom permutation. / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Related-Key Security of Iterated Even–Mansour Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8--12, 2016. Proceedings. Part II / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Tweaking Luby-Rackoff Blockciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16--20, 2015. Proceedings. Part II / rank
 
Normal rank
Property / cites work
 
Property / cites work: MMH: Software message authentication in the Gbit/second rates / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Applications of Time Memory Data Tradeoffs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 -- December 3, 2015. Proceedings. Part II / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - ASIACRYPT '91. International conference on the theory and application of cryptology, Fujiyoshida, Japan, November 11--14, 1991. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweaks and Keys for Block Ciphers: The TWEAKEY Framework / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic Extraction and Key Derivation: The HKDF Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Message Authentication on 64-Bit Architectures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8--11, 2015. Revised selected papers / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409107 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Construct an Ideal Cipher from a Small Set of Public Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweakable Blockciphers with Asymptotically Optimal Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweakable Blockciphers with Beyond Birthday-Bound Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimally Secure Tweakable Blockciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweakable Pseudorandom Permutation from Generalized Feistel Structure / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweak-Length Extension for Tweakable Blockciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Security Analysis of XEX and LRW Modes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Beyond-Birthday-Bound Security Based on Tweakable Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-key Security: The Even-Mansour Construction Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of signature schemes in a multi-user setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15--19, 2012. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5--7, 2004. Revised papers. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Universal Classes of Extremely Random Constant-Time Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1--5, 2013. Proceedings, Part II / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology - CRYPTO '93. 13th annual international cryptology conference, Santa Barbara, CA, USA, August 22 - 26, 1993. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341731 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimally Secure Block Ciphers from Ideal Primitives / rank
 
Normal rank
Property / cites work
 
Property / cites work: New hash functions and their use in authentication and set equality / rank
 
Normal rank

Latest revision as of 09:55, 15 July 2024

scientific article
Language Label Description Also known as
English
Connecting tweakable and multi-key blockcipher security
scientific article

    Statements

    Connecting tweakable and multi-key blockcipher security (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    6 April 2018
    0 references
    Even-Mansour
    0 references
    tweakable Even-Mansour
    0 references
    cascaded LRW
    0 references
    multi-key
    0 references
    conjectures
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers