Minimizing the Two-Round Even-Mansour Cipher

From MaRDI portal
Publication:2874495


DOI10.1007/978-3-662-44371-2_3zbMath1317.94095OpenAlexW114757832MaRDI QIDQ2874495

Jooyoung Lee, Shan Chen, Yannick Seurin, John P. Steinberger, Rodolphe Lampe

Publication date: 7 August 2014

Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-44371-2_3



Related Items

How to build an ideal cipher: the indifferentiability of the Feistel construction, The key-dependent message security of key-alternating Feistel ciphers, On the resilience of Even-Mansour to invariant permutations, BBB Secure Nonce Based MAC Using Public Permutations, Towards tight security of cascaded LRW2, The \(t\)-wise independence of substitution-permutation networks, Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour, Connecting tweakable and multi-key blockcipher security, Cryptanalysis of the Full 8.5-Round REESSE3+ Block Cipher, Open problems in hash function security, Beyond-birthday secure domain-preserving PRFs from a single permutation, Quantum key recovery attacks on tweakable Even-Mansour ciphers, Multi-user security bound for filter permutators in the random oracle model, A modular approach to the security analysis of two-permutation constructions, Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers, BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers, Tight security for key-alternating ciphers with correlated sub-keys, Provably secure reflection ciphers, Provable security against generic attacks on stream ciphers, Minimizing the two-round tweakable Even-Mansour cipher, Tight security analysis of 3-round key-alternating cipher with a single permutation, Strengthening the Known-Key Security Notion for Block Ciphers, Key alternating ciphers based on involutions, On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks, On the XOR of Multiple Random Permutations, Analysis of the single-permutation encrypted Davies-Meyer construction, Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security, XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees, EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC