Connecting tweakable and multi-key blockcipher security
From MaRDI portal
Publication:2413014
DOI10.1007/s10623-017-0347-3zbMath1426.94109OpenAlexW2594725628WikidataQ59606821 ScholiaQ59606821MaRDI QIDQ2413014
Kazuhiko Minematsu, Atul Luykx, Jooyoung Lee, Bart Mennink
Publication date: 6 April 2018
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-017-0347-3
Related Items (4)
On the resilience of Even-Mansour to invariant permutations ⋮ Towards tight security of cascaded LRW2 ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Advances in cryptology -- EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8--12, 2016. Proceedings. Part II
- Advances in cryptology -- ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1--5, 2013. Proceedings, Part II
- Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8--11, 2015. Revised selected papers
- Advances in Cryptology - ASIACRYPT '91. International conference on the theory and application of cryptology, Fujiyoshida, Japan, November 11--14, 1991. Proceedings
- Security of signature schemes in a multi-user setting
- Advances in cryptology -- ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 -- December 3, 2015. Proceedings. Part II
- New hash functions and their use in authentication and set equality
- Advances in cryptology - CRYPTO '93. 13th annual international cryptology conference, Santa Barbara, CA, USA, August 22 - 26, 1993. Proceedings
- A construction of a cipher from a single pseudorandom permutation.
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5--7, 2004. Revised papers.
- Selected areas in cryptography. 13th international workshop, SAC 2006, Montreal, Canada, August 17--18, 2006. Revised selected papers.
- Advances in cryptology -- EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15--19, 2012. Proceedings
- Advances in cryptology -- CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16--20, 2015. Proceedings. Part II
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
- A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
- Optimally Secure Block Ciphers from Ideal Primitives
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- Hash-Function Based PRFs: AMAC and Its Multi-User Security
- Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
- On the Indifferentiability of Key-Alternating Ciphers
- Parallelizable and Authenticated Online Ciphers
- How to Construct an Ideal Cipher from a Small Set of Public Permutations
- Minimizing the Two-Round Even-Mansour Cipher
- Another Look at Tightness
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE
- Tweakable Blockciphers with Asymptotically Optimal Security
- The Related-Key Security of Iterated Even–Mansour Ciphers
- Security of Keyed Sponge Constructions Using a Modular Proof Approach
- Optimally Secure Tweakable Blockciphers
- On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks
- On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher
- Tweaking Even-Mansour Ciphers
- Multi-key Security: The Even-Mansour Construction Revisited
- Tweak-Length Extension for Tweakable Blockciphers
- Cryptographic Extraction and Key Derivation: The HKDF Scheme
- Limitations of the Even-Mansour construction
- Key agreement protocols and their security analysis
- The Wide Trail Design Strategy
- MMH: Software message authentication in the Gbit/second rates
- On Universal Classes of Extremely Random Constant-Time Hash Functions
- An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher
- ELmE: A Misuse Resistant Parallel Authenticated Encryption
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- On Tweaking Luby-Rackoff Blockciphers
- Tight Security Bounds for Key-Alternating Ciphers
- Improved Time-Memory Trade-Offs with Multiple Data
- Improved Security Analysis of XEX and LRW Modes
- Message Authentication on 64-Bit Architectures
- New Applications of Time Memory Data Tradeoffs
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Fast Software Encryption
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
- Topics in Cryptology – CT-RSA 2005
- Fast Software Encryption
- Fast Software Encryption
This page was built for publication: Connecting tweakable and multi-key blockcipher security