Tight Security Bounds for Key-Alternating Ciphers

From MaRDI portal
Revision as of 02:17, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5418704

DOI10.1007/978-3-642-55220-5_19zbMath1317.94096OpenAlexW2134553300MaRDI QIDQ5418704

Shan Chen, John P. Steinberger

Publication date: 27 May 2014

Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_19




Related Items (68)

How to build an ideal cipher: the indifferentiability of the Feistel constructionRelated-key analysis of generalized Feistel networks with expanding round functionsThe key-dependent message security of key-alternating Feistel ciphersRevisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user settingOn the resilience of Even-Mansour to invariant permutationsTowards tight security of cascaded LRW2The \(t\)-wise independence of substitution-permutation networksSeparating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-MansourTweaking Even-Mansour CiphersMulti-key Security: The Even-Mansour Construction RevisitedThe Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBCKey recovery attacks on iterated Even-Mansour encryption schemesRevisiting AES-GCM-SIV: multi-user security, faster key derivation, and better boundsBeyond-birthday security for permutation-based Feistel networksConnecting tweakable and multi-key blockcipher security\(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutationsBeyond-birthday secure domain-preserving PRFs from a single permutationPartition and mix: generalizing the swap-or-not shuffleKeyed sum of permutations: a simpler RP-based PRFMulti-user security bound for filter permutators in the random oracle modelRevisiting BBS signaturesBlock-cipher-based tree hashingAdaptively code-correlation robustness functions and its applications to private set intersectionSalvaging Weak Security Bounds for Blockcipher-Based ConstructionsHow to Build Fully Secure Tweakable Blockciphers from Classical BlockciphersKey-reduced variants of 3Kf9 with beyond-birthday-bound securityJammin' on the deckA modular approach to the security analysis of two-permutation constructionsLayout graphs, random walks and the \(t\)-wise independence of SPN block ciphersBBB security for 5-round even-Mansour-based key-alternating Feistel ciphersBetter security-efficiency trade-offs in permutation-based two-party computationTight security for key-alternating ciphers with correlated sub-keysFine-tuning the ISO/IEC standard \textsf{LightMAC}Categorization of faulty nonce misuse resistant message authentication\textsf{tHyENA}: making \textsf{HyENA} even smallerProvably secure reflection ciphersDesigning tweakable enciphering schemes using public permutationsMinimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules)Offset-based BBB-secure tweakable block-ciphers with updatable cachesProvable security against generic attacks on stream ciphersHalf-tree: halving the cost of tree expansion in COT and DPFOutput masking of tweakable Even-Mansour can be eliminated for message authentication codeA robust and sponge-like PRNG with improved efficiencyMinimizing the two-round tweakable Even-Mansour cipherTight security analysis of 3-round key-alternating cipher with a single permutationHow to build optimally secure PRFs using block ciphersTweaking key-alternating Feistel block ciphersNew Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message LengthStrengthening the Known-Key Security Notion for Block CiphersKey alternating ciphers based on involutionsOn stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacksMinimizing the two-round Even-Mansour cipherThe Multi-user Security of Double EncryptionSlidex attacks on the Even-Mansour encryption schemeOn the XOR of Multiple Random PermutationsThe Oribatida v1.3 family of lightweight authenticated encryption schemesAnalysis of the single-permutation encrypted Davies-Meyer constructionTweaking a block cipher: multi-user beyond-birthday-bound security in the standard modelThe Counter mode with encrypted nonces and its extension to authenticated encryptionCompactness of hashing modes and efficiency beyond Merkle treeProvable related-key security of contracting Feistel networksKey-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user SecurityCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersXPX: Generalized Tweakable Even-Mansour with Improved Security GuaranteesIndifferentiability of 8-Round Feistel NetworksEWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MACSecurity analysis of NIST CTR-DRBGBetter concrete security for half-gates garbling (in the multi-instance setting)







This page was built for publication: Tight Security Bounds for Key-Alternating Ciphers