Online ciphers from tweakable blockciphers
From MaRDI portal
Publication:3073710
DOI10.1007/978-3-642-19074-2_16zbMATH Open1284.94106OpenAlexW1531551812MaRDI QIDQ3073710FDOQ3073710
Authors: Hai-Bin Zhang, Phillip Rogaway
Publication date: 11 February 2011
Published in: Topics in Cryptology – CT-RSA 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19074-2_16
Recommendations
Cites Work
- Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC
- Title not available (Why is that?)
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- On the construction of pseudorandom permutations: Luby-Rackoff revisited
- Title not available (Why is that?)
- Progress in Cryptology - INDOCRYPT 2004
- Progress in Cryptology - INDOCRYPT 2004
- Title not available (Why is that?)
- Efficient implementation of the Galois counter mode using a carry-less multiplier and a fast reduction algorithm
- How to Enrich the Message Space of a Cipher
- Selected Areas in Cryptography
- Title not available (Why is that?)
- Topics in Cryptology – CT-RSA 2004
- Format-preserving encryption
- Title not available (Why is that?)
- New AES Software Speed Records
- On-line ciphers and the Hash-CBC constructions
- Selected Areas in Cryptography
- Practical symmetric on-line encryption.
Cited In (19)
- Implicit key-stretching security of encryption schemes
- Tight security of cascaded LRW2
- Building blockcipher from small-block tweakable blockcipher
- Full disk encryption: bridging theory and practice
- On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers
- Tweaking Even-Mansour ciphers
- On the optimality of non-linear computations for symmetric key primitives
- On-line ciphers and the Hash-CBC constructions
- Title not available (Why is that?)
- Tweaking key-alternating Feistel block ciphers
- Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC
- Revisiting construction of online cipher in hash-ECB-hash structure
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- Parallelizable and authenticated online ciphers
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher
- Selected Areas in Cryptography
- Minimizing the two-round tweakable Even-Mansour cipher
- Building blockcipher from tweakable blockcipher: extending FSE 2009 proposal
Uses Software
This page was built for publication: Online ciphers from tweakable blockciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3073710)