On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks
From MaRDI portal
Publication:2948345
DOI10.1007/978-3-662-46800-5_23zbMath1370.94500OpenAlexW755522289MaRDI QIDQ2948345
Yannick Seurin, Benoît Cogliati
Publication date: 30 September 2015
Published in: Advances in Cryptology -- EUROCRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://hal.uvsq.fr/hal-02163313/file/2015-069.pdf
block cipherindifferentiabilitycorrelation intractabilityideal cipheriterated Even-Mansour cipherkey-alternating cipherrelated-key attackschosen-key attacks
Related Items (18)
Related-key analysis of generalized Feistel networks with expanding round functions ⋮ Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour ⋮ Connecting tweakable and multi-key blockcipher security ⋮ Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey ⋮ Improved domain extender for the ideal cipher ⋮ How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers ⋮ Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers ⋮ Better security-efficiency trade-offs in permutation-based two-party computation ⋮ Tight security for key-alternating ciphers with correlated sub-keys ⋮ Sequential indifferentiability of confusion-diffusion networks ⋮ Designing tweakable enciphering schemes using public permutations ⋮ Minimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules) ⋮ Minimizing the two-round tweakable Even-Mansour cipher ⋮ Tweaking key-alternating Feistel block ciphers ⋮ Strengthening the Known-Key Security Notion for Block Ciphers ⋮ Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications ⋮ Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model ⋮ XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
This page was built for publication: On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks