Pholkos -- efficient large-state tweakable block ciphers from the AES round function
From MaRDI portal
Publication:2152178
DOI10.1007/978-3-030-95312-6_21zbMATH Open1492.94067OpenAlexW4225883647MaRDI QIDQ2152178FDOQ2152178
Authors: Jannis Bossert, Eik List, Stefan Lucks, Sebastian Schmitz
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-95312-6_21
Recommendations
Cites Work
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Title not available (Why is that?)
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Progress in Cryptology - INDOCRYPT 2004
- Linear hulls with correlation zero and linear cryptanalysis of block ciphers
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Improved single-key attacks on 8-round AES-192 and AES-256
- A Meet-in-the-Middle Attack on 8-Round AES
- Title not available (Why is that?)
- Title not available (Why is that?)
- The block cipher \textsc{Square}
- Title not available (Why is that?)
- Structural evaluation by generalized integral property
- 3D: A Three-Dimensional Block Cipher
- Links among impossible differential, integral and zero correlation linear cryptanalysis
- Practical attacks on reduced-round AES
- Boomerang Connectivity Table: a new cryptanalysis tool
- Yoyo tricks with AES
- Probabilistic mixture differential cryptanalysis on round-reduced AES
- New slide attacks on almost self-similar ciphers
- Breaking symmetric cryptosystems using quantum period finding
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Simpira v2: a family of efficient permutations using the AES round function
- Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others
- ZMAC: a fast tweakable block cipher mode for highly secure message authentication
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Upper bound of the length of truncated impossible differentials for AES
- More accurate results on the provable security of AES against impossible differential cryptanalysis
- Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis
- Improved related-tweakey boomerang attacks on Deoxys-BC
- Efficient design strategies based on the \textsf{AES} round function
- Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- Improved key recovery attacks on reduced-round AES in the single-key setting
- Another view of the division property
- The exchange attack: how to distinguish six rounds of AES with \(2^{88.2}\) chosen plaintexts
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)
- Title not available (Why is that?)
- QCB: efficient quantum-secure authenticated encryption
- Improved rebound attacks on AESQ: core permutation of CAESAR candidate PAEQ
- Square attack on 7-round Kiasu-BC
- Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC
- PAEQ: parallelizable permutation-based authenticated encryption
Cited In (2)
Uses Software
This page was built for publication: Pholkos -- efficient large-state tweakable block ciphers from the AES round function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2152178)