The Related-Key Security of Iterated Even–Mansour Ciphers
From MaRDI portal
Publication:2946950
DOI10.1007/978-3-662-48116-5_17zbMATH Open1382.94102OpenAlexW2240009439MaRDI QIDQ2946950FDOQ2946950
Authors: Pooya Farshim, Gordon Procter
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48116-5_17
Recommendations
- On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
- An asymptotically tight security analysis of the iterated Even-Mansour cipher
- Fast Software Encryption
- On quantum related-key attacks on iterated Even-Mansour ciphers
- A related-key attack on iterated chaotic ciphers
- Key recovery attacks on iterated Even-Mansour encryption schemes
- From distinguishers to key recovery: improved related-key attacks on Even-Mansour
- Cryptanalysis of iterated Even-Mansour schemes with two keys
- Encryption schemes secure under related-key and key-dependent message attacks
Cited In (22)
- The indifferentiability of the duplex and its practical applications
- On the resilience of Even-Mansour to invariant permutations
- Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers
- How to build fully secure tweakable blockciphers from classical blockciphers
- Multi-key security: the Even-Mansour construction revisited
- XPX: generalized tweakable Even-Mansour with improved security guarantees
- A synthetic indifferentiability analysis of interleaved double-key Even-Mansour ciphers
- Related-key almost universal hash functions: definitions, constructions and applications
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour
- Key recovery attacks on iterated Even-Mansour encryption schemes
- Better security-efficiency trade-offs in permutation-based two-party computation
- Connecting tweakable and multi-key blockcipher security
- Strengthening the known-key security notion for block ciphers
- Minimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules)
- Tweaking key-alternating Feistel block ciphers
- From distinguishers to key recovery: improved related-key attacks on Even-Mansour
- An asymptotically tight security analysis of the iterated Even-Mansour cipher
- Cryptanalysis of iterated Even-Mansour schemes with two keys
- On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
- On the Role of Key Schedules in Attacks on Iterated Ciphers
- Minimizing the two-round tweakable Even-Mansour cipher
This page was built for publication: The Related-Key Security of Iterated Even–Mansour Ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946950)