XPX: generalized tweakable Even-Mansour with improved security guarantees
From MaRDI portal
Publication:2835583
DOI10.1007/978-3-662-53018-4_3zbMATH Open1351.94058OpenAlexW2398602458MaRDI QIDQ2835583FDOQ2835583
Authors: Bart Mennink
Publication date: 30 November 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-2546.pdf
Recommendations
- Tweaking Even-Mansour ciphers
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code
- Minimizing the two-round tweakable Even-Mansour cipher
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
- Generic attack on iterated tweakable FX constructions
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- A construction of a cipher from a single pseudorandom permutation.
- On the indifferentiability of key-alternating ciphers
- How to construct an ideal cipher from a small set of public permutations
- Minimizing the two-round Even-Mansour cipher
- Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)
- Tight security bounds for key-alternating ciphers
- On the Indifferentiability of the Sponge Construction
- Title not available (Why is that?)
- Parallelizable and authenticated online ciphers
- The Related-Key Security of Iterated Even–Mansour Ciphers
- On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
- Title not available (Why is that?)
- An asymptotically tight security analysis of the iterated Even-Mansour cipher
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Minimalism in cryptography: the Even-Mansour scheme revisited
- The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Improved Security Analysis of XEX and LRW Modes
- On cipher-dependent related-key attacks in the ideal-cipher model
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- Optimally secure tweakable blockciphers
- Towards Understanding the Known-Key Security of Block Ciphers
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- Security of full-state keyed sponge and duplex: applications to authenticated encryption
- Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- XPX: generalized tweakable Even-Mansour with improved security guarantees
- Security of Keyed Sponge Constructions Using a Modular Proof Approach
- Tweaking Even-Mansour ciphers
- New bounds for keyed sponges with extendable output: independence between capacity and message length
- On the XOR of multiple random permutations
- The security of multiple encryption in the ideal cipher model
- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher
- Tweakable blockciphers with asymptotically optimal security
- From distinguishers to key recovery: improved related-key attacks on Even-Mansour
- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
- Related-Key Forgeries for Prøst-OTR
- Strengthening the known-key security notion for block ciphers
Cited In (14)
- On the resilience of Even-Mansour to invariant permutations
- TNT: how to tweak a block cipher
- How to build fully secure tweakable blockciphers from classical blockciphers
- XPX: generalized tweakable Even-Mansour with improved security guarantees
- Related-key almost universal hash functions: definitions, constructions and applications
- Beyond conventional security in sponge-based authenticated encryption modes
- Connecting tweakable and multi-key blockcipher security
- Tweaking key-alternating Feistel block ciphers
- Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
- Low-memory attacks against two-round Even-Mansour using the 3-XOR problem
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code
- An observation on NORX, BLAKE2, and ChaCha
- Cryptanalysis of OCB2: attacks on authenticity and confidentiality
Uses Software
This page was built for publication: XPX: generalized tweakable Even-Mansour with improved security guarantees
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2835583)