Relaxing full-codebook security: a refined analysis of key-length extension schemes
From MaRDI portal
Publication:2946949
Recommendations
- Plain versus randomized cascading-based key-length extension for block ciphers
- Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption
- Efficient and optimally secure key-length extension for block ciphers via randomized cascading
- Cascade Encryption Revisited
- Key-alternating ciphers and key-length extension: exact bounds and multi-user security
Cited in
(10)- The Multi-user Security of Double Encryption
- Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversaries
- Towards tight security of cascaded LRW2
- Efficient and optimally secure key-length extension for block ciphers via randomized cascading
- Plain versus randomized cascading-based key-length extension for block ciphers
- The Security of the Extended Codebook (XCB) Mode of Operation
- Key-alternating ciphers and key-length extension: exact bounds and multi-user security
- Beyond quadratic speedups in quantum attacks on symmetric schemes
- The exact multi-user security of 2-key triple DES
- Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption
This page was built for publication: Relaxing full-codebook security: a refined analysis of key-length extension schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946949)