How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
From MaRDI portal
Publication:2958133
DOI10.1007/978-3-662-53887-6_17zbMath1404.94118OpenAlexW2552956646MaRDI QIDQ2958133
Guoyan Zhang, Jian Guo, Lei Wang, Jingyuan Zhao, Da-Wu Gu
Publication date: 1 February 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53887-6_17
Related Items (9)
Tight security of cascaded LRW2 ⋮ How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers ⋮ Towards closing the security gap of Tweak-aNd-Tweak (TNT) ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher ⋮ Tweaking key-alternating Feistel block ciphers ⋮ \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher ⋮ Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model ⋮ TNT: how to tweak a block cipher
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Tweakable block ciphers
- Advances in Cryptology - ASIACRYPT '91. International conference on the theory and application of cryptology, Fujiyoshida, Japan, November 11--14, 1991. Proceedings
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
- Parallelizable and Authenticated Online Ciphers
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Tweakable Blockciphers with Asymptotically Optimal Security
- Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs
- The Related-Key Security of Iterated Even–Mansour Ciphers
- Optimally Secure Tweakable Blockciphers
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher
- Tweaking Even-Mansour Ciphers
- Tweak-Length Extension for Tweakable Blockciphers
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
- Limitations of the Even-Mansour construction
- Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- On Tweaking Luby-Rackoff Blockciphers
- Tight Security Bounds for Key-Alternating Ciphers
- Advances in Cryptology - CRYPTO 2003
- Improved Security Analysis of XEX and LRW Modes
- Tweakable Enciphering Schemes from Hash-Sum-Expansion
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
- Progress in Cryptology - INDOCRYPT 2004
- Information Security and Cryptology
- Topics in Cryptology – CT-RSA 2004
This page was built for publication: How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers