Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security
From MaRDI portal
Publication:1633451
DOI10.1007/978-3-030-03326-2_8zbMATH Open1446.94133OpenAlexW2890252849MaRDI QIDQ1633451FDOQ1633451
Publication date: 20 December 2018
Full work available at URL: http://hdl.handle.net/2078.1/211893
Recommendations
- The key-dependent message security of key-alternating Feistel ciphers
- Security analysis of key-alternating Feistel ciphers
- Key-alternating ciphers and key-length extension: exact bounds and multi-user security
- Tight security bounds for key-alternating ciphers
- Tweaking key-alternating Feistel block ciphers
- On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
- Understanding the Related-Key Security of Feistel Ciphers From a Provable Perspective
- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- scientific article; zbMATH DE number 1498337
provable securityblockcipherkey-alternating cipherFeistel cipherkey-schedule designkeyed spongemulti-user security
Cites Work
- LBlock: a lightweight block cipher
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Differential Privacy
- Efficient Identity-Based Encryption Without Random Oracles
- Public Key Cryptography – PKC 2004
- The dining cryptographers problem: Unconditional sender and recipient untraceability
- Leakage-resilient symmetric cryptography under empirically verifiable assumptions
- Fast Software Encryption
- Title not available (Why is that?)
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- Title not available (Why is that?)
- Universally Composable Security with Global Setup
- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology – CRYPTO 2004
- Title not available (Why is that?)
- Title not available (Why is that?)
- The square lattice shuffle
- Universally composable synchronous computation
- Bitcoin as a transaction ledger: a composable treatment
- Title not available (Why is that?)
- Optimally secure block ciphers from ideal primitives
- Déjà Q: encore! Un petit IBE
- The Magic of ELFs
- Anonymous card shuffling and its applications to parallel mixnets
- A Formal Treatment of Onion Routing
- Public-seed pseudorandom permutations
- Theory of Cryptography
- cMix: mixing with minimal real-time asymmetric cryptographic operations
Cited In (9)
- The key-dependent message security of key-alternating Feistel ciphers
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers
- Tight security of cascaded LRW2
- On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
- Tweaking key-alternating Feistel block ciphers
- The exact multi-user security of (tweakable) key alternating ciphers with a single permutation
- Security analysis of key-alternating Feistel ciphers
- Beyond-birthday security for permutation-based Feistel networks
This page was built for publication: Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1633451)