Tweaking key-alternating Feistel block ciphers
From MaRDI portal
Publication:2229265
DOI10.1007/978-3-030-57808-4_4OpenAlexW3082533286MaRDI QIDQ2229265FDOQ2229265
Authors: Hailun Yan, Lei Wang, Yaobin Shen, Xuejia Lai
Publication date: 23 February 2021
Full work available at URL: https://infoscience.epfl.ch/record/279641/files/ACNS%202020.pdf
Recommendations
- Optimally secure tweakable blockciphers
- Tweakable blockciphers with asymptotically optimal security
- Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model
- Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security
- Tweakable Blockciphers with Beyond Birthday-Bound Security
Cites Work
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Tight security bounds for key-alternating ciphers
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- Progress in Cryptology - INDOCRYPT 2004
- Topics in Cryptology – CT-RSA 2004
- Parallelizable and authenticated online ciphers
- Security analysis of key-alternating Feistel ciphers
- The Related-Key Security of Iterated Even–Mansour Ciphers
- On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Title not available (Why is that?)
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Information Security and Cryptology
- Title not available (Why is that?)
- The “Coefficients H” Technique
- Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions
- Title not available (Why is that?)
- On Tweaking Luby-Rackoff Blockciphers
- Improved Security Analysis of XEX and LRW Modes
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- How to build fully secure tweakable blockciphers from classical blockciphers
- Online ciphers from tweakable blockciphers
- Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security
- Feistel ciphers. Security proofs and cryptanalysis
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- XPX: generalized tweakable Even-Mansour with improved security guarantees
- Tweaking Even-Mansour ciphers
- Key-alternating ciphers and key-length extension: exact bounds and multi-user security
- Tweakable blockciphers with asymptotically optimal security
- Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model
- Tweaking key-alternating Feistel block ciphers
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
- Tweakable Enciphering Schemes from Hash-Sum-Expansion
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach
Cited In (6)
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- TNT: how to tweak a block cipher
- Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Tweaking AES
- Tweaking key-alternating Feistel block ciphers
This page was built for publication: Tweaking key-alternating Feistel block ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2229265)