On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
From MaRDI portal
Publication:3013081
DOI10.1007/978-3-642-21702-9_8zbMath1282.94030MaRDI QIDQ3013081
Martin R. Albrecht, Pooya Farshim, Kenneth G. Paterson, Gaven J. Watson
Publication date: 7 July 2011
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-21702-9_8
Related Items
A note on quantum related-key attacks, Reflection ciphers, Output masking of tweakable Even-Mansour can be eliminated for message authentication code, Connecting tweakable and multi-key blockcipher security, Clever Arbiters Versus Malicious Adversaries, XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees, On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- New types of cryptanalytic attacks using related keys
- On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
- The random oracle methodology, revisited
- Distinguisher and Related-Key Attack on the Full AES-256
- On Related-Secret Pseudorandomness
- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers
- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Fast Software Encryption
- Fast Software Encryption