On the Indifferentiability of Key-Alternating Ciphers
From MaRDI portal
Publication:2845693
DOI10.1007/978-3-642-40041-4_29zbMath1310.94124OpenAlexW2130574782MaRDI QIDQ2845693
John P. Steinberger, Elena Andreeva, Yevgeniy Dodis, Bart Mennink, Andrey Bogdanov
Publication date: 2 September 2013
Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-40041-4_29
Related Items (26)
How to build an ideal cipher: the indifferentiability of the Feistel construction ⋮ The \(t\)-wise independence of substitution-permutation networks ⋮ KHAPE: Asymmetric PAKE from key-hiding key exchange ⋮ Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour ⋮ Tweaking Even-Mansour Ciphers ⋮ Key recovery attacks on iterated Even-Mansour encryption schemes ⋮ Asymmetric PAKE with low computation \textit{and} communication ⋮ Connecting tweakable and multi-key blockcipher security ⋮ Improved domain extender for the ideal cipher ⋮ Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls ⋮ Randomized half-ideal cipher on groups with applications to UC (a)PAKE ⋮ Salvaging Weak Security Bounds for Blockcipher-Based Constructions ⋮ Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers ⋮ Sequential indifferentiability of confusion-diffusion networks ⋮ Minimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules) ⋮ Provable security against generic attacks on stream ciphers ⋮ Strengthening the Known-Key Security Notion for Block Ciphers ⋮ On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks ⋮ Minimizing the two-round Even-Mansour cipher ⋮ Public-Seed Pseudorandom Permutations ⋮ Slidex attacks on the Even-Mansour encryption scheme ⋮ New slide attacks on almost self-similar ciphers ⋮ Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security ⋮ XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees ⋮ Indifferentiability of 8-Round Feistel Networks ⋮ Indifferentiability for public key cryptosystems
Uses Software
This page was built for publication: On the Indifferentiability of Key-Alternating Ciphers