Key recovery attacks on iterated Even-Mansour encryption schemes
From MaRDI portal
Publication:321305
DOI10.1007/S00145-015-9207-3zbMATH Open1365.94422OpenAlexW2130566903WikidataQ121336330 ScholiaQ121336330MaRDI QIDQ321305FDOQ321305
Orr Dunkelman, Adi Shamir, Itai Dinur, Nathan Keller
Publication date: 13 October 2016
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-015-9207-3
cryptanalysis\(\mathrm{AES}^2\) block cipherbackdoors in cryptographyiterated Even-Mansourkey recovery attacksLED block cipher
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- A construction of a cipher from a single pseudorandom permutation.
- On the Indifferentiability of Key-Alternating Ciphers
- Block Ciphers That Are Easier to Mask: How Far Can We Go?
- How to Construct an Ideal Cipher from a Small Set of Public Permutations
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
- Tight Security Bounds for Key-Alternating Ciphers
- Biclique Cryptanalysis of the Full AES
- Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
- Limitations of the Even-Mansour construction
- An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher
- Title not available (Why is that?)
- Fast software encryption. 6th international workshop, FSE `99. Rome, Italy, March 24--26, 1999. Proceedings
- Advances in cryptology -- ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2--6, 2012. Proceedings
- Advances in cryptology -- EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15--19, 2012. Proceedings
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited
- Cryptanalysis of Round-Reduced $$\mathtt{LED}$$
- Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro
- Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64
- The LED Block Cipher
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Advances in cryptology -- ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1--5, 2013. Proceedings, Part I
- A cryptanalytic time-memory trade-off
- Title not available (Why is that?)
- Differential Analysis of the LED Block Cipher
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Information Security and Cryptology - ICISC 2003
Cited In (11)
- Ephemeral key recovery using index calculus method
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour
- From distinguishers to key recovery: improved related-key attacks on Even-Mansour
- An efficient key recovery attack on SIDH
- The Related-Key Security of Iterated Even–Mansour Ciphers
- \textit{Caveat implementor!} Key recovery attacks on MEGA
- WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction
- On the Role of Key Schedules in Attacks on Iterated Ciphers
- Quantum key recovery attacks on tweakable Even-Mansour ciphers
- Designing tweakable enciphering schemes using public permutations
Uses Software
This page was built for publication: Key recovery attacks on iterated Even-Mansour encryption schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q321305)