An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher
From MaRDI portal
Publication:4911591
DOI10.1007/978-3-642-34961-4_18zbMath1293.94085OpenAlexW1884480624MaRDI QIDQ4911591
Rodolphe Lampe, Jacques Patarin, Yannick Seurin
Publication date: 19 March 2013
Published in: Advances in Cryptology – ASIACRYPT 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34961-4_18
couplingprovable securityrandom permutation modelblockcipherkey-alternating cipherEven-Mansour cipher
Related Items
Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour ⋮ Tweaking Even-Mansour Ciphers ⋮ Key recovery attacks on iterated Even-Mansour encryption schemes ⋮ Connecting tweakable and multi-key blockcipher security ⋮ Tweakable Blockciphers with Asymptotically Optimal Security ⋮ Salvaging Weak Security Bounds for Blockcipher-Based Constructions ⋮ Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers ⋮ Tight security for key-alternating ciphers with correlated sub-keys ⋮ Provably secure reflection ciphers ⋮ Minimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules) ⋮ Provable security against generic attacks on stream ciphers ⋮ Tight security analysis of 3-round key-alternating cipher with a single permutation ⋮ Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher ⋮ AKF: a key alternating Feistel scheme for lightweight cipher designs ⋮ Strengthening the Known-Key Security Notion for Block Ciphers ⋮ Minimizing the two-round Even-Mansour cipher ⋮ Deterministic encryption with the Thorp shuffle ⋮ Slidex attacks on the Even-Mansour encryption scheme ⋮ Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security ⋮ XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees