Key alternating ciphers based on involutions
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 697813 (Why is no real title available?)
- Cryptanalysis of Round-Reduced $$\mathtt{LED}$$
- Fast Software Encryption
- Indistinguishability Amplification
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
- Minimalism in cryptography: the Even-Mansour scheme revisited
- Minimizing the two-round Even-Mansour cipher
- On Recursions Connected With Symmetric Groups I
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- Plain versus randomized cascading-based key-length extension for block ciphers
- Security analysis of key-alternating Feistel ciphers
- Selected Areas in Cryptography
- The security of multiple encryption in the ideal cipher model
- The software performance of authenticated-encryption modes
- Tight security bounds for key-alternating ciphers
Cited in
(6)- scientific article; zbMATH DE number 5773656 (Why is no real title available?)
- Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Provably secure reflection ciphers
- Equivocations for transposition ciphers
- The cycle structure of a class of permutation polynomials
This page was built for publication: Key alternating ciphers based on involutions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1744011)