Key recovery attacks on iterated Even-Mansour encryption schemes
From MaRDI portal
Publication:321305
DOI10.1007/s00145-015-9207-3zbMath1365.94422OpenAlexW2130566903WikidataQ121336330 ScholiaQ121336330MaRDI QIDQ321305
Orr Dunkelman, Adi Shamir, Itai Dinur, Nathan Keller
Publication date: 13 October 2016
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-015-9207-3
cryptanalysis\(\mathrm{AES}^2\) block cipherbackdoors in cryptographyiterated Even-Mansourkey recovery attacksLED block cipher
Related Items (4)
Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour ⋮ Quantum key recovery attacks on tweakable Even-Mansour ciphers ⋮ Designing tweakable enciphering schemes using public permutations ⋮ WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Advances in cryptology -- ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1--5, 2013. Proceedings, Part I
- Fast software encryption. 6th international workshop, FSE `99. Rome, Italy, March 24--26, 1999. Proceedings
- A construction of a cipher from a single pseudorandom permutation.
- Advances in cryptology -- ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2--6, 2012. Proceedings
- Advances in cryptology -- EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15--19, 2012. Proceedings
- On the Indifferentiability of Key-Alternating Ciphers
- Block Ciphers That Are Easier to Mask: How Far Can We Go?
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
- How to Construct an Ideal Cipher from a Small Set of Public Permutations
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited
- Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
- Cryptanalysis of Round-Reduced $$\mathtt{LED}$$
- Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro
- Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64
- Biclique Cryptanalysis of the Full AES
- The LED Block Cipher
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- A cryptanalytic time-memory trade-off
- Limitations of the Even-Mansour construction
- Differential Analysis of the LED Block Cipher
- An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher
- Tight Security Bounds for Key-Alternating Ciphers
- Information Security and Cryptology - ICISC 2003
This page was built for publication: Key recovery attacks on iterated Even-Mansour encryption schemes