Tweakable enciphering schemes using only the encryption function of a block cipher
From MaRDI portal
Publication:1944173
DOI10.1016/j.ipl.2011.06.014zbMath1260.94054OpenAlexW1993258060WikidataQ122877547 ScholiaQ122877547MaRDI QIDQ1944173
Publication date: 4 April 2013
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2011.06.014
Related Items (3)
Another Look at Tightness ⋮ A new multi-linear universal hash family ⋮ \textsf{FAST}: disk encryption and beyond
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A new multi-linear universal hash family
- A general mixing strategy for the ECB-Mix-ECB mode of operation
- On the construction of pseudorandom permutations: Luby-Rackoff revisited
- On the Security of IV Dependent Stream Ciphers
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
- Invertible Universal Hashing and the TET Encryption Mode
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Faster Luby-Rackoff ciphers
- MMH: Software message authentication in the Gbit/second rates
- Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions
- Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
- On Tweaking Luby-Rackoff Blockciphers
- Advances in Cryptology - CRYPTO 2003
- The Security of the Extended Codebook (XCB) Mode of Operation
- Tweakable Enciphering Schemes from Hash-Sum-Expansion
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Fast evaluation of polynomials by rational preparation
- Progress in Cryptology - INDOCRYPT 2004
- Information Security and Cryptology
- Topics in Cryptology – CT-RSA 2004
This page was built for publication: Tweakable enciphering schemes using only the encryption function of a block cipher