Relaxing full-codebook security: a refined analysis of key-length extension schemes
From MaRDI portal
Publication:2946949
DOI10.1007/978-3-662-48116-5_16zbMATH Open1382.94109OpenAlexW2240638099MaRDI QIDQ2946949FDOQ2946949
Authors: Peter Gaži, Jooyoung Lee, Yannick Seurin, John P. Steinberger, Stefano Tessaro
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48116-5_16
Recommendations
- Plain versus randomized cascading-based key-length extension for block ciphers
- Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption
- Efficient and optimally secure key-length extension for block ciphers via randomized cascading
- Cascade Encryption Revisited
- Key-alternating ciphers and key-length extension: exact bounds and multi-user security
Cited In (10)
- The Multi-user Security of Double Encryption
- Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversaries
- Towards tight security of cascaded LRW2
- The Security of the Extended Codebook (XCB) Mode of Operation
- Efficient and optimally secure key-length extension for block ciphers via randomized cascading
- Plain versus randomized cascading-based key-length extension for block ciphers
- Key-alternating ciphers and key-length extension: exact bounds and multi-user security
- Beyond quadratic speedups in quantum attacks on symmetric schemes
- The exact multi-user security of 2-key triple DES
- Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption
This page was built for publication: Relaxing full-codebook security: a refined analysis of key-length extension schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946949)