Sequential indifferentiability of confusion-diffusion networks
From MaRDI portal
Publication:6157575
Recommendations
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 177050 (Why is no real title available?)
- scientific article; zbMATH DE number 1759273 (Why is no real title available?)
- scientific article; zbMATH DE number 1775406 (Why is no real title available?)
- A simplified representation of AES
- A synthetic indifferentiability analysis of interleaved double-key Even-Mansour ciphers
- Communication Theory of Secrecy Systems*
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
- From Indifferentiability to Constructive Cryptography (and Back)
- How to build an ideal cipher: the indifferentiability of the Feistel construction
- How to confirm cryptosystems security: the original Merkle-Damgård is still alive!
- Improving the upper bound on the maximum differential and the maximum linear hull probability for SPN structures and AES.
- Indifferentiability of confusion-diffusion networks
- Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: five rounds are necessary and sufficient
- Indifferentiable authenticated encryption
- Keccak
- Known-Key Distinguishers for Some Block Ciphers
- LBlock: a lightweight block cipher
- Leaky Random Oracle (Extended Abstract)
- Merkle-Damgård Revisited: How to Construct a Hash Function
- Naor-Reingold goes public: the complexity of known-key security
- Nonlinear diffusion layers
- On the Indifferentiability of the Sponge Construction
- On the indifferentiability of key-alternating ciphers
- On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
- On the public indifferentiability and correlation intractability of the 6-round Feistel construction
- Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis
- Provable security of (tweakable) block ciphers based on substitution-permutation networks
- Public-seed pseudorandom permutations
- Revisiting Gilbert's known-key distinguisher
- Salvaging Merkle-Damgård for Practical Applications
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour
- Strengthening the known-key security notion for block ciphers
- Substitution-permutation networks, pseudorandom functions, and natural proofs
- The Wide Trail Design Strategy
- The equivalence of the random oracle model and the ideal cipher model, revisited
- Theory of Cryptography
- Towards Understanding the Known-Key Security of Block Ciphers
Cited in
(3)
This page was built for publication: Sequential indifferentiability of confusion-diffusion networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6157575)