On the Indifferentiability of Key-Alternating Ciphers

From MaRDI portal
Publication:2845693

DOI10.1007/978-3-642-40041-4_29zbMath1310.94124OpenAlexW2130574782MaRDI QIDQ2845693

John P. Steinberger, Elena Andreeva, Yevgeniy Dodis, Bart Mennink, Andrey Bogdanov

Publication date: 2 September 2013

Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-40041-4_29




Related Items (26)

How to build an ideal cipher: the indifferentiability of the Feistel constructionThe \(t\)-wise independence of substitution-permutation networksKHAPE: Asymmetric PAKE from key-hiding key exchangeSeparating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-MansourTweaking Even-Mansour CiphersKey recovery attacks on iterated Even-Mansour encryption schemesAsymmetric PAKE with low computation \textit{and} communicationConnecting tweakable and multi-key blockcipher securityImproved domain extender for the ideal cipherImpossibility of indifferentiable iterated blockciphers from 3 or less primitive callsRandomized half-ideal cipher on groups with applications to UC (a)PAKESalvaging Weak Security Bounds for Blockcipher-Based ConstructionsLayout graphs, random walks and the \(t\)-wise independence of SPN block ciphersSequential indifferentiability of confusion-diffusion networksMinimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules)Provable security against generic attacks on stream ciphersStrengthening the Known-Key Security Notion for Block CiphersOn stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacksMinimizing the two-round Even-Mansour cipherPublic-Seed Pseudorandom PermutationsSlidex attacks on the Even-Mansour encryption schemeNew slide attacks on almost self-similar ciphersKey-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user SecurityXPX: Generalized Tweakable Even-Mansour with Improved Security GuaranteesIndifferentiability of 8-Round Feistel NetworksIndifferentiability for public key cryptosystems


Uses Software



This page was built for publication: On the Indifferentiability of Key-Alternating Ciphers