A General Construction of Tweakable Block Ciphers and Different Modes of Operations
From MaRDI portal
Publication:3604475
Recommendations
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Tweakable block ciphers
- scientific article; zbMATH DE number 1942411
- Tweakable enciphering schemes using only the encryption function of a block cipher
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Building Secure Block Ciphers on Generic Attacks Assumptions
- Optimally secure tweakable blockciphers
- Tweakable blockciphers with asymptotically optimal security
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
Cited in
(16)- Building Secure Block Ciphers on Generic Attacks Assumptions
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code
- The software performance of authenticated-encryption modes
- A method of constructing symmetric-key block cryptosystem resistant to manipulations on ciphertext
- On modes of operations of a block cipher for authentication and authenticated encryption
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Farasha: a provable permutation-based parallelizable PRF
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- NIST Block Cipher Modes of Operation for Confidentiality
- Tight security of \textsf{TNT} and beyond. Attacks, proofs and possibilities for the cascaded \textsf{LRW} paradigm
- Tweaking key-alternating Feistel block ciphers
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher
- Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher
- Tight security of cascaded LRW2
- Tweakable enciphering schemes using only the encryption function of a block cipher
This page was built for publication: A General Construction of Tweakable Block Ciphers and Different Modes of Operations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3604475)