Key recovery attacks on iterated Even-Mansour encryption schemes
From MaRDI portal
Publication:321305
Recommendations
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
- Cryptanalysis of iterated Even-Mansour schemes with two keys
- New key recovery attacks on minimal two-round Even-Mansour ciphers
- The Related-Key Security of Iterated Even–Mansour Ciphers
- On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
Cites work
- scientific article; zbMATH DE number 16479 (Why is no real title available?)
- scientific article; zbMATH DE number 1759266 (Why is no real title available?)
- scientific article; zbMATH DE number 1394296 (Why is no real title available?)
- scientific article; zbMATH DE number 1418242 (Why is no real title available?)
- scientific article; zbMATH DE number 1418257 (Why is no real title available?)
- scientific article; zbMATH DE number 1416653 (Why is no real title available?)
- A construction of a cipher from a single pseudorandom permutation.
- A cryptanalytic time-memory trade-off
- Advances in cryptology -- ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2--6, 2012. Proceedings
- Advances in cryptology -- ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1--5, 2013. Proceedings, Part I
- Advances in cryptology -- EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15--19, 2012. Proceedings
- An asymptotically tight security analysis of the iterated Even-Mansour cipher
- Analytic combinatorics
- Biclique Cryptanalysis of the Full AES
- Block ciphers that are easier to mask: how far can we go?
- Cryptanalysis of Round-Reduced $$\mathtt{LED}$$
- Cryptanalysis of iterated Even-Mansour schemes with two keys
- Differential analysis of the LED block cipher
- Fast software encryption. 6th international workshop, FSE `99. Rome, Italy, March 24--26, 1999. Proceedings
- How to construct an ideal cipher from a small set of public permutations
- Improved linear sieving techniques with applications to step-reduced LED-64
- Information Security and Cryptology - ICISC 2003
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
- Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)
- Limitations of the Even-Mansour construction
- Minimalism in cryptography: the Even-Mansour scheme revisited
- On the indifferentiability of key-alternating ciphers
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Probabilistic slide cryptanalysis and its applications to LED-64 and Zorro
- The LED block cipher
- Tight security bounds for key-alternating ciphers
Cited in
(15)- Quantum key recovery attacks on tweakable Even-Mansour ciphers
- An efficient key recovery attack on SIDH
- The Related-Key Security of Iterated Even–Mansour Ciphers
- On the Role of Key Schedules in Attacks on Iterated Ciphers
- \textit{Caveat implementor!} Key recovery attacks on MEGA
- WEM: a new family of white-box block ciphers based on the Even-Mansour construction
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
- Ephemeral key recovery using index calculus method
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour
- Key alternating ciphers based on involutions
- Cryptanalysis of iterated Even-Mansour schemes with two keys
- From distinguishers to key recovery: improved related-key attacks on Even-Mansour
- Designing tweakable enciphering schemes using public permutations
- On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
- New key recovery attacks on minimal two-round Even-Mansour ciphers
This page was built for publication: Key recovery attacks on iterated Even-Mansour encryption schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q321305)