Tweakable block ciphers
From MaRDI portal
Publication:451118
DOI10.1007/s00145-010-9073-yzbMath1258.94040OpenAlexW2126290606WikidataQ121144791 ScholiaQ121144791MaRDI QIDQ451118
David Wagner, Ronald L. Rivest, Moses Liskov
Publication date: 21 September 2012
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-010-9073-y
Related Items (39)
Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications ⋮ Format-preserving encryption: a survey ⋮ Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE ⋮ Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance ⋮ Incremental cryptography revisited: PRFs, nonces and modular design ⋮ Compact proofs of retrievability ⋮ Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes ⋮ Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128 ⋮ Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers ⋮ Attacks and Security Proofs of EAX-Prime ⋮ Several proofs of security for a tokenization algorithm ⋮ QCB is blindly unforgeable ⋮ XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation ⋮ Tight security of cascaded LRW2 ⋮ A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality ⋮ Nonlinear Invariant Attack ⋮ Simpira v2: A Family of Efficient Permutations Using the AES Round Function ⋮ How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers ⋮ Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks ⋮ QCB: efficient quantum-secure authenticated encryption ⋮ Better security-efficiency trade-offs in permutation-based two-party computation ⋮ FAST: secure and high performance format-preserving encryption and tokenization ⋮ Designing tweakable enciphering schemes using public permutations ⋮ Offset-based BBB-secure tweakable block-ciphers with updatable caches ⋮ Output masking of tweakable Even-Mansour can be eliminated for message authentication code ⋮ Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher ⋮ On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers ⋮ On a mnemonic construction of permutations ⋮ Differential-linear and related key cryptanalysis of round-reduced scream ⋮ Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 ⋮ The \texttt{Deoxys} AEAD family ⋮ Новый режим аутентифицированного шифрования для произвольного блочного шифра на основе универсальной функции хэширования ⋮ Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY} ⋮ Provable related-key security of contracting Feistel networks ⋮ Impossible Differential Cryptanalysis of Reduced-Round SKINNY ⋮ Square Attack on 7-Round Kiasu-BC ⋮ Breaking Symmetric Cryptosystems Using Quantum Period Finding ⋮ Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems ⋮ The MALICIOUS framework: embedding backdoors into tweakable block ciphers
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- CBC MACs for arbitrary-length messages: The three-key constructions
- On the construction of pseudorandom permutations: Luby-Rackoff revisited
- New types of cryptanalytic attacks using related keys
- A construction of a cipher from a single pseudorandom permutation.
- Cryptanalysis of the Mercy Block Cipher
- On Fast and Provably Secure Message Authentication Based on Universal Hashing
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Limitations of the Even-Mansour construction
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
- On Tweaking Luby-Rackoff Blockciphers
- Advances in Cryptology - CRYPTO 2003
- Improved Security Analysis of XEX and LRW Modes
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Progress in Cryptology - INDOCRYPT 2004
- Topics in Cryptology – CT-RSA 2004
- How to protect DES against exhaustive key search (an analysis of DESX).
- The security of the cipher block chaining message authentication code
This page was built for publication: Tweakable block ciphers