Towards Understanding the Known-Key Security of Block Ciphers (Q2946886): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: On the Indifferentiability of the Grøstl Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-Property-Preserving Hash Domain Extension and the EMD Transform / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Indifferentiability of the Sponge Construction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Analysis of the Mode of JH Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Cryptanalysis of the Full AES-192 and AES-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distinguisher and Related-Key Attack on the Full AES-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Biclique Cryptanalysis of the Full AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Random Oracle Model and the Ideal Cipher Model Are Equivalent / rank
 
Normal rank
Property / cites work
 
Property / cites work: Merkle-Damgård Revisited: How to Construct a Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484903 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Wide Trail Design Strategy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Salvaging Merkle-Damgård for Practical Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4314029 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Some Plausible Constructions of Double-Block-Length Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Simple Variant of the Merkle-Damgård Scheme with a Permutation / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Generalized Feistel Networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: The equivalence of the random oracle model and the ideal cipher model, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry / rank
 
Normal rank
Property / cites work
 
Property / cites work: Known-Key Distinguishers for Some Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279661 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Construct Pseudorandom Permutations from Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279681 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Collision Security in Double Block Length Hashing with Single Length Key / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hash Functions Based on Three Permutations: A Generic Security Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Impossible Differential and Known-Key Distinguishers for the 3D Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the construction of pseudorandom permutations: Luby-Rackoff revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Known and Chosen Key Differential Distinguishers for Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4950452 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035727 / rank
 
Normal rank
Property / cites work
 
Property / cites work: About Feistel Schemes with Six (or More) Rounds / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341762 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia / rank
 
Normal rank
Property / cites work
 
Property / cites work: Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Building a Collision-Resistant Compression Function from Non-compressing Primitives / rank
 
Normal rank
Property / cites work
 
Property / cites work: Blockcipher-Based Hashing Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Decorrelation: a theory for block cipher security / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses / rank
 
Normal rank

Latest revision as of 18:34, 10 July 2024

scientific article
Language Label Description Also known as
English
Towards Understanding the Known-Key Security of Block Ciphers
scientific article

    Statements

    Towards Understanding the Known-Key Security of Block Ciphers (English)
    0 references
    0 references
    0 references
    0 references
    18 September 2015
    0 references
    block ciphers
    0 references
    known-key security
    0 references
    known-key distinguishers
    0 references
    indifferentiability
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers