Publication:4934727

From MaRDI portal


zbMath0951.94521MaRDI QIDQ4934727

Eli Biham

Publication date: 31 January 2000



94A60: Cryptography


Related Items

Higher Order Differential Attack of a CAST Cipher, Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications, eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices, Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006, The Delicate Issues of Addition with Respect to XOR Differences, X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs, 3D: A Three-Dimensional Block Cipher, Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions, On the Role of Key Schedules in Attacks on Iterated Ciphers, Related-key attacks on the compression function of Streebog, On the related-key attack security of authenticated encryption schemes, When messages are keys: is HMAC a dual-PRF?, And Rijndael? Automatic related-key differential analysis of Rijndael, Continuously non-malleable codes against bounded-depth tampering, Relations between robustness and RKA security under public-key encryption, Notions and relations for RKA-secure permutation and function families, The (related-key) impossible boomerang attack and its application to the AES block cipher, Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system, Revisiting AES related-key differential attacks with constraint programming, Related-key security for pseudorandom functions beyond the linear barrier, Analyzing the provable security bounds of GIFT-COFB and Photon-Beetle, Computing AES related-key differential characteristics with constraint programming, Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman, Clever Arbiters Versus Malicious Adversaries, Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions, CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask, Improved Differential Cryptanalysis of CAST-128 and CAST-256, SPF: A New Family of Efficient Format-Preserving Encryption Algorithms, On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model, Related-Key Cryptanalysis of Midori, Related-key attack on 5-round Kuznyechik, Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis, Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES