Two practical and provably secure block ciphers: BEAR and LION
From MaRDI portal
Publication:4593789
DOI10.1007/3-540-60865-6_48zbMATH Open1373.94908OpenAlexW1490586645MaRDI QIDQ4593789FDOQ4593789
Authors: Ross Anderson, Eli Biham
Publication date: 15 November 2017
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-60865-6_48
Recommendations
Cited In (17)
- Related-key analysis of generalized Feistel networks with expanding round functions
- The key-dependent message security of key-alternating Feistel ciphers
- Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256
- All-or-nothing encryption and the package transform
- Attacking BEAR and LION schemes in a realistic scenario
- On the provable security of BEAR and LION schemes
- CCA security for contracting (quasi-)Feistel constructions with tight round complexity
- Provable related-key security of contracting Feistel networks
- Simpira v2: a family of efficient permutations using the AES round function
- Building Secure Block Ciphers on Generic Attacks Assumptions
- Towards minimizing tweakable blockcipher-based generalized Feistel networks
- Cryptanalysis of Ladder-DES
- A randomness test for block ciphers
- RIV for robust authenticated encryption
- Collision attack on 4-branch, type-2 GFN based hash functions using sliced biclique cryptanalysis technique
- On the security of remotely keyed encryption
- Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
This page was built for publication: Two practical and provably secure block ciphers: BEAR and LION
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4593789)