XPX: generalized tweakable Even-Mansour with improved security guarantees
From MaRDI portal
Publication:2835583
DOI10.1007/978-3-662-53018-4_3zbMATH Open1351.94058OpenAlexW2398602458MaRDI QIDQ2835583FDOQ2835583
Publication date: 30 November 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-2546.pdf
Recommendations
- Tweaking Even-Mansour ciphers
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code
- Minimizing the two-round tweakable Even-Mansour cipher
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
- Generic attack on iterated tweakable FX constructions
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- A construction of a cipher from a single pseudorandom permutation.
- On the Indifferentiability of Key-Alternating Ciphers
- How to Construct an Ideal Cipher from a Small Set of Public Permutations
- Minimizing the Two-Round Even-Mansour Cipher
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
- Tight Security Bounds for Key-Alternating Ciphers
- On the Indifferentiability of the Sponge Construction
- Title not available (Why is that?)
- Parallelizable and Authenticated Online Ciphers
- The Related-Key Security of Iterated Even–Mansour Ciphers
- On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks
- Title not available (Why is that?)
- An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited
- The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Improved Security Analysis of XEX and LRW Modes
- On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- Optimally Secure Tweakable Blockciphers
- Towards Understanding the Known-Key Security of Block Ciphers
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
- Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
- Security of Keyed Sponge Constructions Using a Modular Proof Approach
- Tweaking Even-Mansour Ciphers
- New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length
- On the XOR of Multiple Random Permutations
- The Security of Multiple Encryption in the Ideal Cipher Model
- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher
- Tweakable Blockciphers with Asymptotically Optimal Security
- From distinguishers to key recovery: improved related-key attacks on Even-Mansour
- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
- Related-Key Forgeries for Prøst-OTR
- Strengthening the Known-Key Security Notion for Block Ciphers
Cited In (14)
- On the resilience of Even-Mansour to invariant permutations
- TNT: how to tweak a block cipher
- Beyond conventional security in sponge-based authenticated encryption modes
- Connecting tweakable and multi-key blockcipher security
- Tweaking key-alternating Feistel block ciphers
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
- Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
- Low-memory attacks against two-round Even-Mansour using the 3-XOR problem
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code
- Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
- An observation on NORX, BLAKE2, and ChaCha
- Cryptanalysis of OCB2: attacks on authenticity and confidentiality
Uses Software
This page was built for publication: XPX: generalized tweakable Even-Mansour with improved security guarantees
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2835583)