scientific article; zbMATH DE number 1759261
From MaRDI portal
Publication:4537982
zbMATH Open0994.68637MaRDI QIDQ4537982FDOQ4537982
Authors: Paul Crowley
Publication date: 13 October 2002
Title of this publication is not available (Why is that?)
Recommendations
Computing methodologies and applications (68U99) Data encryption (aspects in computer science) (68P25)
Cited In (14)
- Building blockcipher from small-block tweakable blockcipher
- Tweak-length extension for tweakable blockciphers
- Tweakable blockciphers with asymptotically optimal security
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
- Tweakable block ciphers
- Tweaking key-alternating Feistel block ciphers
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher
- Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
- Tight security of \textsf{TNT} and beyond. Attacks, proofs and possibilities for the cascaded \textsf{LRW} paradigm
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- Format-preserving encryption algorithms using families of tweakable blockciphers
- Mystrium: wide block encryption efficient on entry-level processors
- Minimizing the two-round tweakable Even-Mansour cipher
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4537982)