Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
From MaRDI portal
Publication:2692967
DOI10.1007/s10623-022-01137-wOpenAlexW4308247988MaRDI QIDQ2692967
Chun Guo, Zhen Qin, Zhongliang Zhang
Publication date: 17 March 2023
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-022-01137-w
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Tweakable block ciphers
- A construction of a cipher from a single pseudorandom permutation.
- Towards tight security of cascaded LRW2
- Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model
- Provable security of (tweakable) block ciphers based on substitution-permutation networks
- Information-theoretic indistinguishability via the chi-squared method
- Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: five rounds are necessary and sufficient
- Insuperability of the standard versus ideal model gap for tweakable blockcipher security
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- The design and evolution of OCB
- The \texttt{Deoxys} AEAD family
- TNT: how to tweak a block cipher
- Tight security of cascaded LRW2
- Minimizing the two-round tweakable Even-Mansour cipher
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
- A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
- Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
- How to Construct an Ideal Cipher from a Small Set of Public Permutations
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Tweakable Blockciphers with Asymptotically Optimal Security
- Security Analysis of Key-Alternating Feistel Ciphers
- Optimally Secure Tweakable Blockciphers
- Robust Authenticated-Encryption AEZ and the Problem That It Solves
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
- Feistel Ciphers
- How to Encipher Messages on a Small Domain
- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher
- Tweaking Even-Mansour Ciphers
- On Generalized Feistel Networks
- The “Coefficients H” Technique
- An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher
- Understanding the Related-Key Security of Feistel Ciphers From a Provable Perspective
- On Tweaking Luby-Rackoff Blockciphers
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
- Theory of Cryptography
This page was built for publication: Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher