Pages that link to "Item:Q5418704"
From MaRDI portal
The following pages link to Tight Security Bounds for Key-Alternating Ciphers (Q5418704):
Displaying 50 items.
- How to build an ideal cipher: the indifferentiability of the Feistel construction (Q271585) (← links)
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour (Q306057) (← links)
- Key recovery attacks on iterated Even-Mansour encryption schemes (Q321305) (← links)
- Related-key analysis of generalized Feistel networks with expanding round functions (Q826269) (← links)
- The key-dependent message security of key-alternating Feistel ciphers (Q826271) (← links)
- On the resilience of Even-Mansour to invariant permutations (Q831175) (← links)
- Towards tight security of cascaded LRW2 (Q1631325) (← links)
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds (Q1648810) (← links)
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code (Q1698650) (← links)
- A robust and sponge-like PRNG with improved efficiency (Q1698655) (← links)
- Key alternating ciphers based on involutions (Q1744011) (← links)
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks (Q1749800) (← links)
- Analysis of the single-permutation encrypted Davies-Meyer construction (Q1801088) (← links)
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model (Q1801090) (← links)
- Minimizing the two-round Even-Mansour cipher (Q1994640) (← links)
- Slidex attacks on the Even-Mansour encryption scheme (Q2018815) (← links)
- The Oribatida v1.3 family of lightweight authenticated encryption schemes (Q2040556) (← links)
- Compactness of hashing modes and efficiency beyond Merkle tree (Q2056724) (← links)
- Provable related-key security of contracting Feistel networks (Q2057179) (← links)
- Security analysis of NIST CTR-DRBG (Q2096485) (← links)
- Better concrete security for half-gates garbling (in the multi-instance setting) (Q2096549) (← links)
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting (Q2129001) (← links)
- The \(t\)-wise independence of substitution-permutation networks (Q2139644) (← links)
- Tweaking key-alternating Feistel block ciphers (Q2229265) (← links)
- Connecting tweakable and multi-key blockcipher security (Q2413014) (← links)
- Beyond-birthday secure domain-preserving PRFs from a single permutation (Q2416937) (← links)
- Multi-user security bound for filter permutators in the random oracle model (Q2420473) (← links)
- Beyond-birthday security for permutation-based Feistel networks (Q2657129) (← links)
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations (Q2672297) (← links)
- Adaptively code-correlation robustness functions and its applications to private set intersection (Q2682918) (← links)
- Minimizing the two-round tweakable Even-Mansour cipher (Q2692357) (← links)
- Tight security analysis of 3-round key-alternating cipher with a single permutation (Q2692361) (← links)
- How to build optimally secure PRFs using block ciphers (Q2692365) (← links)
- On the XOR of Multiple Random Permutations (Q2794522) (← links)
- Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security (Q2835581) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees (Q2835583) (← links)
- Indifferentiability of 8-Round Feistel Networks (Q2835584) (← links)
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC (Q2835585) (← links)
- Salvaging Weak Security Bounds for Blockcipher-Based Constructions (Q2958132) (← links)
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers (Q2958133) (← links)
- The Counter mode with encrypted nonces and its extension to authenticated encryption (Q3383103) (← links)
- Tweaking Even-Mansour Ciphers (Q3457110) (← links)
- Multi-key Security: The Even-Mansour Construction Revisited (Q3457111) (← links)
- The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC (Q3457119) (← links)
- New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length (Q4639468) (← links)
- Strengthening the Known-Key Security Notion for Block Ciphers (Q4639495) (← links)
- The Multi-user Security of Double Encryption (Q5738981) (← links)
- Partition and mix: generalizing the swap-or-not shuffle (Q6041586) (← links)
- BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers (Q6146590) (← links)