Tweakable block ciphers

From MaRDI portal
Publication:451118

DOI10.1007/s00145-010-9073-yzbMath1258.94040OpenAlexW2126290606WikidataQ121144791 ScholiaQ121144791MaRDI QIDQ451118

David Wagner, Ronald L. Rivest, Moses Liskov

Publication date: 21 September 2012

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-010-9073-y




Related Items (39)

Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applicationsFormat-preserving encryption: a surveyImpossible Differential Cryptanalysis of Reduced-Round Tweakable TWINEOnline Authenticated-Encryption and its Nonce-Reuse Misuse-ResistanceIncremental cryptography revisited: PRFs, nonces and modular designCompact proofs of retrievabilityWeak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering SchemesImproved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128Format-Preserving Encryption Algorithms Using Families of Tweakable BlockciphersAttacks and Security Proofs of EAX-PrimeSeveral proofs of security for a tokenization algorithmQCB is blindly unforgeableXOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computationTight security of cascaded LRW2A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentialityNonlinear Invariant AttackSimpira v2: A Family of Efficient Permutations Using the AES Round FunctionHow to Build Fully Secure Tweakable Blockciphers from Classical BlockciphersQuantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networksQCB: efficient quantum-secure authenticated encryptionBetter security-efficiency trade-offs in permutation-based two-party computationFAST: secure and high performance format-preserving encryption and tokenizationDesigning tweakable enciphering schemes using public permutationsOffset-based BBB-secure tweakable block-ciphers with updatable cachesOutput masking of tweakable Even-Mansour can be eliminated for message authentication codeJust tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipherOn rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphersOn a mnemonic construction of permutationsDifferential-linear and related key cryptanalysis of round-reduced screamNonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64The \texttt{Deoxys} AEAD familyНовый режим аутентифицированного шифрования для произвольного блочного шифра на основе универсальной функции хэшированияBiased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY}Provable related-key security of contracting Feistel networksImpossible Differential Cryptanalysis of Reduced-Round SKINNYSquare Attack on 7-Round Kiasu-BCBreaking Symmetric Cryptosystems Using Quantum Period FindingTowards Sound Fresh Re-keying with Hard (Physical) Learning ProblemsThe MALICIOUS framework: embedding backdoors into tweakable block ciphers



Cites Work


This page was built for publication: Tweakable block ciphers