Tweakable Enciphering Schemes from Hash-Sum-Expansion
From MaRDI portal
Publication:5458214
DOI10.1007/978-3-540-77026-8_19zbMATH Open1153.94413OpenAlexW1527081975MaRDI QIDQ5458214FDOQ5458214
Authors: Kazuhiko Minematsu, Toshiyasu Matsushima
Publication date: 11 April 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77026-8_19
Recommendations
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
- Tweakable HCTR: a BBB secure tweakable enciphering scheme
- Weak-key and related-key analysis of hash-counter-hash tweakable enciphering schemes
- Tweakable block ciphers
Cites Work
- New hash functions and their use in authentication and set equality
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Title not available (Why is that?)
- On the construction of pseudorandom permutations: Luby-Rackoff revisited
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- The Security of the Extended Codebook (XCB) Mode of Operation
- Progress in Cryptology - INDOCRYPT 2004
- Topics in Cryptology – CT-RSA 2004
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Information Security and Cryptology
- Faster Luby-Rackoff ciphers
- Improved Security Analysis of XEX and LRW Modes
- Modern cryptography, probabilistic proofs and pseudo-randomness
- Title not available (Why is that?)
- Luby-Rackoff Ciphers from Weak Round Functions?
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach
- A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security
- Information Security and Cryptology - ICISC 2005
Cited In (17)
- Length-preserving encryption based on single-key tweakable block cipher
- Tweakable HCTR: a BBB secure tweakable enciphering scheme
- Weak-key and related-key analysis of hash-counter-hash tweakable enciphering schemes
- Tweakable enciphering schemes using only the encryption function of a block cipher
- How to build fully secure tweakable blockciphers from classical blockciphers
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
- Tweaking key-alternating Feistel block ciphers
- Mystrium: wide block encryption efficient on entry-level processors
- Building blockcipher from tweakable blockcipher: extending FSE 2009 proposal
- Designing tweakable enciphering schemes using public permutations
- An Inverse-Free Single-Keyed Tweakable Enciphering Scheme
- An Improved Security Bound for HCTR
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
- Invertible Universal Hashing and the TET Encryption Mode
- A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation
- Information Security and Cryptology
This page was built for publication: Tweakable Enciphering Schemes from Hash-Sum-Expansion
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458214)