Strengthening the Known-Key Security Notion for Block Ciphers
From MaRDI portal
Publication:4639495
DOI10.1007/978-3-662-52993-5_25zbMath1387.94077OpenAlexW2499503922MaRDI QIDQ4639495
Yannick Seurin, Benoît Cogliati
Publication date: 9 May 2018
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-52993-5_25
block cipherindifferentiabilitycorrelation intractabilityideal cipheriterated Even-Mansour cipherkey-alternating cipherknown-key attacks
Related Items (3)
Sequential indifferentiability of confusion-diffusion networks ⋮ Minimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules) ⋮ XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
Cites Work
- Unnamed Item
- A construction of a cipher from a single pseudorandom permutation.
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
- A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
- On the Indifferentiability of Key-Alternating Ciphers
- How to Construct an Ideal Cipher from a Small Set of Public Permutations
- Minimizing the Two-Round Even-Mansour Cipher
- On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited
- A Simplified Representation of AES
- Towards Understanding the Known-Key Security of Block Ciphers
- The Related-Key Security of Iterated Even–Mansour Ciphers
- On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks
- Careful with Composition: Limitations of the Indifferentiability Framework
- Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes
- Known and Chosen Key Differential Distinguishers for Block Ciphers
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
- Salvaging Merkle-Damgård for Practical Applications
- Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks
- An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher
- Resource-Restricted Indifferentiability
- On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
- Known-Key Distinguishers for Some Block Ciphers
- Tight Security Bounds for Key-Alternating Ciphers
- Security/Efficiency Tradeoffs for Permutation-Based Hashing
- Leaky Random Oracle (Extended Abstract)
- Theory of Cryptography
This page was built for publication: Strengthening the Known-Key Security Notion for Block Ciphers