On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers
From MaRDI portal
Publication:3503881
DOI10.1007/978-3-540-75670-5_13zbMath1138.94372OpenAlexW1537463833MaRDI QIDQ3503881
Raphael C.-W. Phan, Marc Joye, Ermaliza Razali
Publication date: 10 June 2008
Published in: Provable Security (Search for Journal in Brave)
Full work available at URL: http://infoscience.epfl.ch/record/114990
block cipherProvable securitypseudorandom permutation (PRP)key recovery (KR)related key attacks (RKA)
Related Items (3)
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model ⋮ Notions and relations for RKA-secure permutation and function families ⋮ How much data may be safely processed on one key in different modes?
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- CHOSEN-KEY ATTACKS ON A BLOCK CIPHER
- Selected Areas in Cryptography
- Fast Software Encryption
- Topics in Cryptology – CT-RSA 2004
- How to protect DES against exhaustive key search (an analysis of DESX).
- The security of the cipher block chaining message authentication code
This page was built for publication: On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers