Two practical and provably secure block ciphers: BEAR and LION
From MaRDI portal
Publication:4593789
Recommendations
Cited in
(17)- Building Secure Block Ciphers on Generic Attacks Assumptions
- Towards minimizing tweakable blockcipher-based generalized Feistel networks
- Attacking BEAR and LION schemes in a realistic scenario
- On the provable security of BEAR and LION schemes
- Related-key analysis of generalized Feistel networks with expanding round functions
- The key-dependent message security of key-alternating Feistel ciphers
- Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256
- On the security of remotely keyed encryption
- All-or-nothing encryption and the package transform
- Provable related-key security of contracting Feistel networks
- Cryptanalysis of Ladder-DES
- A randomness test for block ciphers
- RIV for robust authenticated encryption
- Simpira v2: a family of efficient permutations using the AES round function
- Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
- Collision attack on 4-branch, type-2 GFN based hash functions using sliced biclique cryptanalysis technique
- CCA security for contracting (quasi-)Feistel constructions with tight round complexity
This page was built for publication: Two practical and provably secure block ciphers: BEAR and LION
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4593789)