The key-dependent message security of key-alternating Feistel ciphers
From MaRDI portal
Publication:826271
DOI10.1007/978-3-030-75539-3_15zbMATH Open1479.94168OpenAlexW3159722302MaRDI QIDQ826271FDOQ826271
Authors: Pooya Farshim, Louiza Khati, Yannick Seurin, Damien Vergnaud
Publication date: 20 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-75539-3_15
Recommendations
- Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security
- Security analysis of key-alternating Feistel ciphers
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- On the indifferentiability of key-alternating ciphers
- On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- About Feistel schemes with six (or more) rounds
- Advances in Cryptology – CRYPTO 2004
- Circular-Secure Encryption from Decision Diffie-Hellman
- Fast Probabilistic Algorithms for Verification of Polynomial Identities
- Full disk encryption: bridging theory and practice
- Indifferentiability of 8-Round Feistel Networks
- Key-dependent message security: generic amplification and completeness
- Minimizing the two-round Even-Mansour cipher
- New block encryption algorithm MISTY
- On generalized Feistel networks
- On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
- Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security
- Security analysis of key-alternating Feistel ciphers
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- The key-dependent message security of key-alternating Feistel ciphers
- The related-key analysis of Feistel constructions
- The “Coefficients H” Technique
- Tight security bounds for key-alternating ciphers
- Two practical and provably secure block ciphers: BEAR and LION
Cited In (8)
- The key-dependent message security of key-alternating Feistel ciphers
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers
- Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security
- On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
- Title not available (Why is that?)
- KFC – The Krazy Feistel Cipher
- Security analysis of key-alternating Feistel ciphers
This page was built for publication: The key-dependent message security of key-alternating Feistel ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q826271)