Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
From MaRDI portal
Publication:2936613
DOI10.1007/978-3-662-45608-8_15zbMATH Open1317.94113OpenAlexW1958084802MaRDI QIDQ2936613FDOQ2936613
Ivica Nikolić, Thomas Peyrin, Jérémy Jean
Publication date: 6 January 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-45608-8_15
Recommendations
- Tweakable block ciphers
- scientific article; zbMATH DE number 1942411
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- On Tweaking Luby-Rackoff Blockciphers
- Tweak-length extension for tweakable blockciphers
- Tweaking key-alternating Feistel block ciphers
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher
- Tweakable enciphering schemes using only the encryption function of a block cipher
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
Cited In (72)
- Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
- Differential meet-in-the-middle cryptanalysis
- Weak subtweakeys in SKINNY
- \textsf{LightMAC}: fork it and make it faster
- Offset-based BBB-secure tweakable block-ciphers with updatable caches
- Related-tweak impossible differential cryptanalysis of reduced-round \texttt{TweAES}
- Finding all impossible differentials when considering the DDT
- Lightweight leakage-resilient PRNG from TBCs using superposition
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- Key structures: improved related-key boomerang attack against the full AES-256
- Secret can be public: low-memory AEAD mode for high-order masking
- Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond
- Tight security of \textsf{TNT} and beyond. Attacks, proofs and possibilities for the cascaded \textsf{LRW} paradigm
- Generalized Feistel ciphers for efficient prime field masking
- Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE
- Automatic Demirci-Selçuk meet-in-the-middle attack on SKINNY with key-bridging
- Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery
- Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
- Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys
- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis
- On the resilience of Even-Mansour to invariant permutations
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Implementing Grover oracle for lightweight block ciphers under depth constraints
- Lightweight authenticated encryption mode suitable for threshold implementation
- TNT: how to tweak a block cipher
- Impossible Differential Cryptanalysis of Reduced-Round SKINNY
- TweetNaCl: A Crypto Library in 100 Tweets
- Tight security of cascaded LRW2
- XHX -- a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing
- Variants of the AES key schedule for better truncated differential bounds
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Optimizing rectangle attacks: a unified and generic framework for key recovery
- Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Transciphering framework for approximate homomorphic encryption
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
- Connecting tweakable and multi-key blockcipher security
- On the Efficiency of ZMAC-Type Modes
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption
- Towards closing the security gap of Tweak-aNd-Tweak (TNT)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Tweaking key-alternating Feistel block ciphers
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function
- Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3
- Analysis of the CAESAR Candidate Silver
- The \texttt{Deoxys} AEAD family
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher
- tweakey
- Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128
- Authenticated Encryption with Small Stretch (or, How to Accelerate AERO)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Key recovery attacks on reduced-round Joltik-BC in the single-key setting
- Tweak-Length Extension for Tweakable Blockciphers
- Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
- Efficient leakage-resilient MACs without idealized assumptions
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- SPF: A New Family of Efficient Format-Preserving Encryption Algorithms
- Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch
- Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY}
- Truncated boomerang attacks and application to AES-based ciphers
- Square Attack on 7-Round Kiasu-BC
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- Efficient and Provable White-Box Primitives
- Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher
- Biclique Attack of Block Cipher SKINNY
- Exploring lightweight efficiency of ForkAES
- Related-Key Impossible-Differential Attack on Reduced-Round Skinny
This page was built for publication: Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2936613)