Key recovery attacks on iterated Even-Mansour encryption schemes
DOI10.1007/S00145-015-9207-3zbMATH Open1365.94422OpenAlexW2130566903WikidataQ121336330 ScholiaQ121336330MaRDI QIDQ321305FDOQ321305
Authors: Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Publication date: 13 October 2016
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-015-9207-3
Recommendations
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
- Cryptanalysis of iterated Even-Mansour schemes with two keys
- New key recovery attacks on minimal two-round Even-Mansour ciphers
- The Related-Key Security of Iterated Even–Mansour Ciphers
- On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
cryptanalysis\(\mathrm{AES}^2\) block cipherbackdoors in cryptographyiterated Even-Mansourkey recovery attacksLED block cipher
Cites Work
- Title not available (Why is that?)
- Analytic combinatorics
- A construction of a cipher from a single pseudorandom permutation.
- On the indifferentiability of key-alternating ciphers
- Block ciphers that are easier to mask: how far can we go?
- How to construct an ideal cipher from a small set of public permutations
- Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)
- Tight security bounds for key-alternating ciphers
- Biclique Cryptanalysis of the Full AES
- Cryptanalysis of iterated Even-Mansour schemes with two keys
- Limitations of the Even-Mansour construction
- An asymptotically tight security analysis of the iterated Even-Mansour cipher
- Title not available (Why is that?)
- Fast software encryption. 6th international workshop, FSE `99. Rome, Italy, March 24--26, 1999. Proceedings
- Advances in cryptology -- ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2--6, 2012. Proceedings
- Advances in cryptology -- EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15--19, 2012. Proceedings
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
- Minimalism in cryptography: the Even-Mansour scheme revisited
- Cryptanalysis of Round-Reduced $$\mathtt{LED}$$
- Probabilistic slide cryptanalysis and its applications to LED-64 and Zorro
- Improved linear sieving techniques with applications to step-reduced LED-64
- The LED block cipher
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Advances in cryptology -- ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1--5, 2013. Proceedings, Part I
- A cryptanalytic time-memory trade-off
- Title not available (Why is that?)
- Differential analysis of the LED block cipher
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Information Security and Cryptology - ICISC 2003
Cited In (15)
- Ephemeral key recovery using index calculus method
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
- Key alternating ciphers based on involutions
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour
- WEM: a new family of white-box block ciphers based on the Even-Mansour construction
- From distinguishers to key recovery: improved related-key attacks on Even-Mansour
- An efficient key recovery attack on SIDH
- The Related-Key Security of Iterated Even–Mansour Ciphers
- \textit{Caveat implementor!} Key recovery attacks on MEGA
- Cryptanalysis of iterated Even-Mansour schemes with two keys
- On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
- On the Role of Key Schedules in Attacks on Iterated Ciphers
- New key recovery attacks on minimal two-round Even-Mansour ciphers
- Quantum key recovery attacks on tweakable Even-Mansour ciphers
- Designing tweakable enciphering schemes using public permutations
Uses Software
This page was built for publication: Key recovery attacks on iterated Even-Mansour encryption schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q321305)