Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
From MaRDI portal
Publication:2936613
DOI10.1007/978-3-662-45608-8_15zbMATH Open1317.94113OpenAlexW1958084802MaRDI QIDQ2936613FDOQ2936613
Authors: Jérémy Jean, Ivica Nikolić, Thomas Peyrin
Publication date: 6 January 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-45608-8_15
Recommendations
- Tweakable block ciphers
- scientific article; zbMATH DE number 1942411
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- On Tweaking Luby-Rackoff Blockciphers
- Tweak-length extension for tweakable blockciphers
- Tweaking key-alternating Feistel block ciphers
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher
- Tweakable enciphering schemes using only the encryption function of a block cipher
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
Cited In (73)
- Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis
- On the resilience of Even-Mansour to invariant permutations
- Statistical fault attacks on nonce-based authenticated encryption schemes
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Related-key impossible-differential attack on reduced-round \textsc{Skinny}
- Weak-key and related-key analysis of hash-counter-hash tweakable enciphering schemes
- Implementing Grover oracle for lightweight block ciphers under depth constraints
- Lightweight authenticated encryption mode suitable for threshold implementation
- TNT: how to tweak a block cipher
- TweetNaCl: A Crypto Library in 100 Tweets
- Tight security of cascaded LRW2
- XHX -- a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing
- Tweak-length extension for tweakable blockciphers
- How to build fully secure tweakable blockciphers from classical blockciphers
- Variants of the AES key schedule for better truncated differential bounds
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Analysis of the CAESAR candidate silver
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Optimizing rectangle attacks: a unified and generic framework for key recovery
- Authenticated encryption with small stretch (or, how to accelerate AERO)
- SPF: a new family of efficient format-preserving encryption algorithms
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Transciphering framework for approximate homomorphic encryption
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch
- Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
- Square attack on 7-round Kiasu-BC
- Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC
- Connecting tweakable and multi-key blockcipher security
- Biclique attack of block cipher \texttt{SKINNY}
- On the Efficiency of ZMAC-Type Modes
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption
- Towards closing the security gap of Tweak-aNd-Tweak (TNT)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Tweaking key-alternating Feistel block ciphers
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function
- Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3
- The \texttt{Deoxys} AEAD family
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher
- tweakey
- Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Key recovery attacks on reduced-round Joltik-BC in the single-key setting
- Impossible differential cryptanalysis of reduced-round \texttt{SKINNY}
- Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY}
- Truncated boomerang attacks and application to AES-based ciphers
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- Efficient and Provable White-Box Primitives
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher
- Exploring lightweight efficiency of ForkAES
- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
- Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
- Differential meet-in-the-middle cryptanalysis
- Weak subtweakeys in SKINNY
- Impossible differential cryptanalysis of reduced-round tweakable TWINE
- \textsf{LightMAC}: fork it and make it faster
- Offset-based BBB-secure tweakable block-ciphers with updatable caches
- Related-tweak impossible differential cryptanalysis of reduced-round \texttt{TweAES}
- Finding all impossible differentials when considering the DDT
- Lightweight leakage-resilient PRNG from TBCs using superposition
- Efficient leakage-resilient MACs without idealized assumptions
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- Key structures: improved related-key boomerang attack against the full AES-256
- Secret can be public: low-memory AEAD mode for high-order masking
- Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond
- Tight security of \textsf{TNT} and beyond. Attacks, proofs and possibilities for the cascaded \textsf{LRW} paradigm
- Generalized Feistel ciphers for efficient prime field masking
- Automatic Demirci-Selçuk meet-in-the-middle attack on SKINNY with key-bridging
- Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery
- Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
This page was built for publication: Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2936613)