A General Construction of Tweakable Block Ciphers and Different Modes of Operations
From MaRDI portal
Publication:3604475
DOI10.1109/TIT.2008.920247zbMATH Open1328.94062OpenAlexW2121015072WikidataQ122980610 ScholiaQ122980610MaRDI QIDQ3604475FDOQ3604475
Authors: Debrup Chakraborty, Palash Sarkar
Publication date: 24 February 2009
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tit.2008.920247
Recommendations
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Tweakable block ciphers
- scientific article; zbMATH DE number 1942411
- Tweakable enciphering schemes using only the encryption function of a block cipher
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Building Secure Block Ciphers on Generic Attacks Assumptions
- Optimally secure tweakable blockciphers
- Tweakable blockciphers with asymptotically optimal security
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
Cited In (16)
- Tweakable enciphering schemes using only the encryption function of a block cipher
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Tight security of cascaded LRW2
- On modes of operations of a block cipher for authentication and authenticated encryption
- Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher
- A method of constructing symmetric-key block cryptosystem resistant to manipulations on ciphertext
- Farasha: a provable permutation-based parallelizable PRF
- NIST Block Cipher Modes of Operation for Confidentiality
- Tweaking key-alternating Feistel block ciphers
- Building Secure Block Ciphers on Generic Attacks Assumptions
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Tight security of \textsf{TNT} and beyond. Attacks, proofs and possibilities for the cascaded \textsf{LRW} paradigm
- The software performance of authenticated-encryption modes
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code
This page was built for publication: A General Construction of Tweakable Block Ciphers and Different Modes of Operations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3604475)