The key-dependent message security of key-alternating Feistel ciphers
From MaRDI portal
Publication:826271
Recommendations
- Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security
- Security analysis of key-alternating Feistel ciphers
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- On the indifferentiability of key-alternating ciphers
- On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
Cites work
- scientific article; zbMATH DE number 176558 (Why is no real title available?)
- scientific article; zbMATH DE number 503342 (Why is no real title available?)
- scientific article; zbMATH DE number 697813 (Why is no real title available?)
- scientific article; zbMATH DE number 1951605 (Why is no real title available?)
- scientific article; zbMATH DE number 2009979 (Why is no real title available?)
- scientific article; zbMATH DE number 1759273 (Why is no real title available?)
- scientific article; zbMATH DE number 1426196 (Why is no real title available?)
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- About Feistel schemes with six (or more) rounds
- Advances in Cryptology – CRYPTO 2004
- Circular-Secure Encryption from Decision Diffie-Hellman
- Fast Probabilistic Algorithms for Verification of Polynomial Identities
- Full disk encryption: bridging theory and practice
- Indifferentiability of 8-Round Feistel Networks
- Key-dependent message security: generic amplification and completeness
- Minimizing the two-round Even-Mansour cipher
- New block encryption algorithm MISTY
- On generalized Feistel networks
- On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
- Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security
- Security analysis of key-alternating Feistel ciphers
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- The key-dependent message security of key-alternating Feistel ciphers
- The related-key analysis of Feistel constructions
- The “Coefficients H” Technique
- Tight security bounds for key-alternating ciphers
- Two practical and provably secure block ciphers: BEAR and LION
Cited in
(8)- BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers
- KFC – The Krazy Feistel Cipher
- The key-dependent message security of key-alternating Feistel ciphers
- Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security
- On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- Security analysis of key-alternating Feistel ciphers
- scientific article; zbMATH DE number 1951605 (Why is no real title available?)
This page was built for publication: The key-dependent message security of key-alternating Feistel ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q826271)