Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security
From MaRDI portal
Publication:1633451
Recommendations
- The key-dependent message security of key-alternating Feistel ciphers
- Security analysis of key-alternating Feistel ciphers
- Key-alternating ciphers and key-length extension: exact bounds and multi-user security
- Tight security bounds for key-alternating ciphers
- Tweaking key-alternating Feistel block ciphers
- On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
- Understanding the Related-Key Security of Feistel Ciphers From a Provable Perspective
- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- scientific article; zbMATH DE number 1498337
Cites work
- scientific article; zbMATH DE number 1690172 (Why is no real title available?)
- scientific article; zbMATH DE number 1690177 (Why is no real title available?)
- scientific article; zbMATH DE number 503344 (Why is no real title available?)
- scientific article; zbMATH DE number 1942416 (Why is no real title available?)
- scientific article; zbMATH DE number 1759791 (Why is no real title available?)
- scientific article; zbMATH DE number 2090929 (Why is no real title available?)
- scientific article; zbMATH DE number 2090930 (Why is no real title available?)
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- A Formal Treatment of Onion Routing
- Advances in Cryptology – CRYPTO 2004
- Anonymous card shuffling and its applications to parallel mixnets
- Bitcoin as a transaction ledger: a composable treatment
- Differential Privacy
- Déjà Q: encore! Un petit IBE
- Efficient Identity-Based Encryption Without Random Oracles
- Fast Software Encryption
- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
- LBlock: a lightweight block cipher
- Leakage-resilient symmetric cryptography under empirically verifiable assumptions
- Optimally secure block ciphers from ideal primitives
- Public Key Cryptography – PKC 2004
- Public-seed pseudorandom permutations
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- The Magic of ELFs
- The dining cryptographers problem: Unconditional sender and recipient untraceability
- The square lattice shuffle
- Theory of Cryptography
- Universally Composable Security with Global Setup
- Universally composable synchronous computation
- cMix: mixing with minimal real-time asymmetric cryptographic operations
Cited in
(9)- BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers
- Beyond-birthday security for permutation-based Feistel networks
- The key-dependent message security of key-alternating Feistel ciphers
- The exact multi-user security of (tweakable) key alternating ciphers with a single permutation
- On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
- Tweaking key-alternating Feistel block ciphers
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- Security analysis of key-alternating Feistel ciphers
- Tight security of cascaded LRW2
This page was built for publication: Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1633451)