On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses
From MaRDI portal
Publication:3211253
Recommendations
Cited in
(50)- \( \mathsf{XS} \)-circuits in block ciphers
- Simplified MITM modeling for permutations: new (quantum) attacks
- Building Secure Block Ciphers on Generic Attacks Assumptions
- Towards minimizing tweakable blockcipher-based generalized Feistel networks
- LLLWBC: a new low-latency light-weight block cipher
- New algorithm for exhausting optimal permutations for generalized Feistel networks
- On the diffusion of the improved generalized Feistel
- scientific article; zbMATH DE number 7300370 (Why is no real title available?)
- Invertible quadratic non-linear functions over \(\mathbb{F}_p^n\) via multiple local maps
- \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications
- scientific article; zbMATH DE number 7310284 (Why is no real title available?)
- WARP: revisiting GFN for lightweight 128-bit block cipher
- The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers
- Constructing lightweight optimal diffusion primitives with Feistel structure
- Construction of MDS matrices from generalized Feistel structures
- Applications of Simon's algorithm in quantum attacks on Feistel variants
- On the guaranteed number of activations in \(\mathsf{XS}\)-circuits
- Robust encryption, revisited
- Towards Understanding the Known-Key Security of Block Ciphers
- Related-key analysis of generalized Feistel networks with expanding round functions
- Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
- Key-recovery attacks on \texttt{CRAFT} and \texttt{WARP}
- Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256
- Provable secure scalable block ciphers.
- Very Compact Hardware Implementations of the Blockcipher CLEFIA
- On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis
- Analysis of minimum numbers of linearly active \(S\)-boxes of a class of generalized Feistel block ciphers
- Generalized Feistel networks revisited
- Provable related-key security of contracting Feistel networks
- An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines
- Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis
- О групповых свойствах классов SH- и TH-алгоритмов Фейстеля с линейно зависящими от координат ключа функциями усложнения;On group properties of classes Source-Heavy and Target-Heavy Feistel block ciphers with round functions linear dependent on round keys parts
- Analysis of \(3\)-line generalized Feistel networks with double SD-functions
- scientific article; zbMATH DE number 1951621 (Why is no real title available?)
- Automated meet-in-the-middle attack goes to Feistel
- Generalized Feistel ciphers for efficient prime field masking
- Pseudorandomness of Camellia-like scheme
- scientific article; zbMATH DE number 733882 (Why is no real title available?)
- On unbalanced feistel networks with contracting MDS diffusion
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
- On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability
- Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures
- Simpira v2: a family of efficient permutations using the AES round function
- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
- Collision attack on 4-branch, type-2 GFN based hash functions using sliced biclique cryptanalysis technique
- Quantum attacks on generalized Feistel networks based on the strong-weak separability
- Advances in Cryptology - CRYPTO 2003
- Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited
- CCA security for contracting (quasi-)Feistel constructions with tight round complexity
This page was built for publication: On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3211253)