Pholkos -- efficient large-state tweakable block ciphers from the AES round function
From MaRDI portal
Publication:2152178
DOI10.1007/978-3-030-95312-6_21zbMATH Open1492.94067OpenAlexW4225883647MaRDI QIDQ2152178FDOQ2152178
Sebastian Schmitz, Eik List, Jannis Bossert, Stefan Lucks
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-95312-6_21
Recommendations
Cites Work
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Title not available (Why is that?)
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Progress in Cryptology - INDOCRYPT 2004
- Linear hulls with correlation zero and linear cryptanalysis of block ciphers
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- A Meet-in-the-Middle Attack on 8-Round AES
- Title not available (Why is that?)
- Title not available (Why is that?)
- The block cipher Square
- Title not available (Why is that?)
- Structural Evaluation by Generalized Integral Property
- 3D: A Three-Dimensional Block Cipher
- Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
- Practical attacks on reduced-round AES
- Boomerang Connectivity Table: a new cryptanalysis tool
- Yoyo tricks with AES
- Probabilistic mixture differential cryptanalysis on round-reduced AES
- New slide attacks on almost self-similar ciphers
- Breaking Symmetric Cryptosystems Using Quantum Period Finding
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- ZMAC: a fast tweakable block cipher mode for highly secure message authentication
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Upper bound of the length of truncated impossible differentials for AES
- More accurate results on the provable security of AES against impossible differential cryptanalysis
- Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis
- Improved related-tweakey boomerang attacks on Deoxys-BC
- Efficient Design Strategies Based on the AES Round Function
- Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Another View of the Division Property
- The exchange attack: how to distinguish six rounds of AES with \(2^{88.2}\) chosen plaintexts
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)
- Title not available (Why is that?)
- QCB: efficient quantum-secure authenticated encryption
- Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ
- Square Attack on 7-Round Kiasu-BC
- Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
- PAEQ: Parallelizable Permutation-Based Authenticated Encryption
Cited In (2)
Uses Software
This page was built for publication: Pholkos -- efficient large-state tweakable block ciphers from the AES round function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2152178)