Sequential indifferentiability of confusion-diffusion networks
From MaRDI portal
Publication:6157575
DOI10.1007/978-3-030-92518-5_5zbMATH Open1514.94071OpenAlexW4206790564MaRDI QIDQ6157575FDOQ6157575
Authors: Qi Da, Shanjie Xu, Chun Guo
Publication date: 12 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-92518-5_5
Recommendations
indifferentiabilityconfusion-diffusioncorrelation intractabilityblock cipherssubstitution-permutation networks
Cites Work
- LBlock: a lightweight block cipher
- Keccak
- Communication Theory of Secrecy Systems*
- How to build an ideal cipher: the indifferentiability of the Feistel construction
- Title not available (Why is that?)
- On the indifferentiability of key-alternating ciphers
- On the public indifferentiability and correlation intractability of the 6-round Feistel construction
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
- The equivalence of the random oracle model and the ideal cipher model, revisited
- Merkle-Damgård Revisited: How to Construct a Hash Function
- On the Indifferentiability of the Sponge Construction
- Theory of Cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour
- Salvaging Merkle-Damgård for Practical Applications
- Known-Key Distinguishers for Some Block Ciphers
- Leaky Random Oracle (Extended Abstract)
- Improving the upper bound on the maximum differential and the maximum linear hull probability for SPN structures and AES.
- The Wide Trail Design Strategy
- A simplified representation of AES
- Towards Understanding the Known-Key Security of Block Ciphers
- Revisiting Gilbert's known-key distinguisher
- Provable security of (tweakable) block ciphers based on substitution-permutation networks
- Title not available (Why is that?)
- Substitution-permutation networks, pseudorandom functions, and natural proofs
- Public-seed pseudorandom permutations
- Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis
- Naor-Reingold goes public: the complexity of known-key security
- Indifferentiable authenticated encryption
- Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: five rounds are necessary and sufficient
- Nonlinear diffusion layers
- From Indifferentiability to Constructive Cryptography (and Back)
- Indifferentiability of confusion-diffusion networks
- A synthetic indifferentiability analysis of interleaved double-key Even-Mansour ciphers
- Strengthening the known-key security notion for block ciphers
- How to confirm cryptosystems security: the original Merkle-Damgård is still alive!
Cited In (3)
This page was built for publication: Sequential indifferentiability of confusion-diffusion networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6157575)