Key alternating ciphers based on involutions
From MaRDI portal
Publication:1744011
DOI10.1007/s10623-017-0371-3zbMath1391.94774WikidataQ122908485 ScholiaQ122908485MaRDI QIDQ1744011
Publication date: 16 April 2018
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-017-0371-3
involution; indistinguishability; key alternating cipher; pseudorandom permutation; Even-Mansour cipher
94A60: Cryptography
Uses Software
Cites Work
- Unnamed Item
- Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
- The Security of Multiple Encryption in the Ideal Cipher Model
- Minimizing the Two-Round Even-Mansour Cipher
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited
- Cryptanalysis of Round-Reduced $$\mathtt{LED}$$
- Security Analysis of Key-Alternating Feistel Ciphers
- The Software Performance of Authenticated-Encryption Modes
- Indistinguishability Amplification
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- Tight Security Bounds for Key-Alternating Ciphers
- Advances in Cryptology - ASIACRYPT 2004
- Selected Areas in Cryptography
- Fast Software Encryption
- On Recursions Connected With Symmetric Groups I