Multi-key Security: The Even-Mansour Construction Revisited
From MaRDI portal
Publication:3457111
DOI10.1007/978-3-662-47989-6_10zbMath1369.94559OpenAlexW2185381909MaRDI QIDQ3457111
Publication date: 10 December 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-47989-6_10
Related Items (19)
Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting ⋮ On the resilience of Even-Mansour to invariant permutations ⋮ Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds ⋮ Efficient schemes for committing authenticated encryption ⋮ Connecting tweakable and multi-key blockcipher security ⋮ Simpira v2: A Family of Efficient Permutations Using the AES Round Function ⋮ Salvaging Weak Security Bounds for Blockcipher-Based Constructions ⋮ Multi-user security of the sum of truncated random permutations ⋮ A modular approach to the security analysis of two-permutation constructions ⋮ Improved multi-user security using the squared-ratio method ⋮ Luby-Rackoff backwards with more users and more security ⋮ Minimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules) ⋮ On the adaptive security of MACs and PRFs ⋮ The Multi-user Security of Double Encryption ⋮ Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model ⋮ Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security ⋮ The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3 ⋮ Multi-user BBB security of public permutations based MAC ⋮ Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
Cites Work
- Unnamed Item
- Advances in Cryptology - ASIACRYPT '91. International conference on the theory and application of cryptology, Fujiyoshida, Japan, November 11--14, 1991. Proceedings
- New types of cryptanalytic attacks using related keys
- A construction of a cipher from a single pseudorandom permutation.
- Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14--18, 2000. Proceedings
- Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3--7, 2000. Proceedings
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- Advances in cryptology -- EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15--19, 2012. Proceedings
- Another look at HMAC
- Another Look at Tightness
- Distinguisher and Related-Key Attack on the Full AES-256
- The “Coefficients H” Technique
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- An Improved Recovery Algorithm for Decayed AES Key Schedule Images
- A cryptanalytic time-memory trade-off
- Known-Key Distinguishers for Some Block Ciphers
- Tight Security Bounds for Key-Alternating Ciphers
- New Applications of Time Memory Data Tradeoffs
This page was built for publication: Multi-key Security: The Even-Mansour Construction Revisited