The following pages link to Tweakable block ciphers (Q451118):
Displayed 39 items.
- On a mnemonic construction of permutations (Q515400) (← links)
- Several proofs of security for a tokenization algorithm (Q1683979) (← links)
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code (Q1698650) (← links)
- On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers (Q1749791) (← links)
- Differential-linear and related key cryptanalysis of round-reduced scream (Q1751405) (← links)
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 (Q2010591) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY} (Q2051820) (← links)
- Provable related-key security of contracting Feistel networks (Q2057179) (← links)
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers (Q2102066) (← links)
- Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications (Q2120997) (← links)
- Incremental cryptography revisited: PRFs, nonces and modular design (Q2152052) (← links)
- Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128 (Q2179384) (← links)
- Tight security of cascaded LRW2 (Q2188969) (← links)
- Compact proofs of retrievability (Q2392096) (← links)
- Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher (Q2692967) (← links)
- Square Attack on 7-Round Kiasu-BC (Q2822691) (← links)
- Breaking Symmetric Cryptosystems Using Quantum Period Finding (Q2829216) (← links)
- Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems (Q2829218) (← links)
- Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers (Q2942832) (← links)
- Attacks and Security Proofs of EAX-Prime (Q2946885) (← links)
- Nonlinear Invariant Attack (Q2953771) (← links)
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function (Q2958116) (← links)
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers (Q2958133) (← links)
- Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes (Q3194586) (← links)
- Новый режим аутентифицированного шифрования для произвольного блочного шифра на основе универсальной функции хэширования (Q3381883) (← links)
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance (Q3457125) (← links)
- Impossible Differential Cryptanalysis of Reduced-Round SKINNY (Q4975182) (← links)
- Format-preserving encryption: a survey (Q5042277) (← links)
- Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE (Q5048963) (← links)
- QCB is blindly unforgeable (Q6057210) (← links)
- XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation (Q6061533) (← links)
- A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality (Q6072194) (← links)
- Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks (Q6123047) (← links)
- QCB: efficient quantum-secure authenticated encryption (Q6157508) (← links)
- Better security-efficiency trade-offs in permutation-based two-party computation (Q6157519) (← links)
- FAST: secure and high performance format-preserving encryption and tokenization (Q6157559) (← links)
- Designing tweakable enciphering schemes using public permutations (Q6167296) (← links)
- Offset-based BBB-secure tweakable block-ciphers with updatable caches (Q6169463) (← links)