Tweakable Enciphering Schemes from Hash-Sum-Expansion
From MaRDI portal
Publication:5458214
Recommendations
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
- Tweakable HCTR: a BBB secure tweakable enciphering scheme
- Weak-key and related-key analysis of hash-counter-hash tweakable enciphering schemes
- Tweakable block ciphers
Cites work
- scientific article; zbMATH DE number 1942411 (Why is no real title available?)
- scientific article; zbMATH DE number 1942437 (Why is no real title available?)
- scientific article; zbMATH DE number 2086702 (Why is no real title available?)
- A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security
- Advances in Cryptology - CRYPTO 2003
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Faster Luby-Rackoff ciphers
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Improved Security Analysis of XEX and LRW Modes
- Information Security and Cryptology
- Information Security and Cryptology - ICISC 2005
- Luby-Rackoff Ciphers from Weak Round Functions?
- Modern cryptography, probabilistic proofs and pseudo-randomness
- New hash functions and their use in authentication and set equality
- On the construction of pseudorandom permutations: Luby-Rackoff revisited
- Progress in Cryptology - INDOCRYPT 2004
- The Security of the Extended Codebook (XCB) Mode of Operation
- Topics in Cryptology – CT-RSA 2004
Cited in
(17)- Invertible Universal Hashing and the TET Encryption Mode
- A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation
- Information Security and Cryptology
- Length-preserving encryption based on single-key tweakable block cipher
- Tweakable HCTR: a BBB secure tweakable enciphering scheme
- Tweakable enciphering schemes using only the encryption function of a block cipher
- Weak-key and related-key analysis of hash-counter-hash tweakable enciphering schemes
- How to build fully secure tweakable blockciphers from classical blockciphers
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
- Tweaking key-alternating Feistel block ciphers
- Mystrium: wide block encryption efficient on entry-level processors
- Building blockcipher from tweakable blockcipher: extending FSE 2009 proposal
- Designing tweakable enciphering schemes using public permutations
- An Inverse-Free Single-Keyed Tweakable Enciphering Scheme
- An Improved Security Bound for HCTR
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
This page was built for publication: Tweakable Enciphering Schemes from Hash-Sum-Expansion
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458214)