On the resilience of Even-Mansour to invariant permutations
From MaRDI portal
(Redirected from Publication:831175)
Recommendations
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 697813 (Why is no real title available?)
- scientific article; zbMATH DE number 1024657 (Why is no real title available?)
- scientific article; zbMATH DE number 1942411 (Why is no real title available?)
- scientific article; zbMATH DE number 1759267 (Why is no real title available?)
- scientific article; zbMATH DE number 862975 (Why is no real title available?)
- scientific article; zbMATH DE number 1418257 (Why is no real title available?)
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
- A practical attack on KeeLoq
- Advanced Encryption Standard – AES
- Advances in cryptology -- CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14--18, 2011. Proceedings
- Almost universal forgery attacks on AES-based MAC's
- Analysis of BLAKE2
- Another look at complementation properties
- BLAKE2: simpler, smaller, fast as MD5
- Birthday paradox, coupon collectors, caching algorithms and self- organizing search
- Block cipher invariants as eigenvectors of correlation matrices
- CBEAM: efficient authenticated encryption from feebly one-way functions
- Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
- Connecting tweakable and multi-key blockcipher security
- Constructions and families of covering codes and saturated sets of points in projective geometry
- Cryptanalysis of Ascon
- Efficient slide attacks
- Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8--11, 2015. Revised selected papers
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- Full-state keyed duplex with built-in multi-user support
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- Improved differential attacks for ECHO and Grøstl
- In How Many Ways Can You Write Rijndael?
- Inside the Hypercube
- Keccak
- Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)
- Linear codes with covering radius 2 and other new covering codes
- Minimal 1-saturating sets and complete caps in binary projective spaces.
- Minimalism in cryptography: the Even-Mansour scheme revisited
- Minimizing the two-round Even-Mansour cipher
- Multi-key security: the Even-Mansour construction revisited
- NORX: Parallel and scalable AEAD
- New bounds for keyed sponges with extendable output: independence between capacity and message length
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- On defining sets for projective planes
- On the Indifferentiability of the Sponge Construction
- On the Salsa20 Core Function
- PRINTcipher: A Block Cipher for IC-Printing
- Practical Cryptanalysis of PAES
- Progress in Cryptology - INDOCRYPT 2004
- Proving resistance against invariant attacks: how to choose the round constants
- Robust authenticated-encryption AEZ and the problem that it solves
- Saturated configurations of points in projective Galois spaces
- Security of Keyed Sponge Constructions Using a Modular Proof Approach
- Security of full-state keyed sponge and duplex: applications to authenticated encryption
- Short codes with a given covering radius
- Simpira v2: a family of efficient permutations using the AES round function
- Sum-free sets in vector spaces over \(GF(2)\)
- The PHOTON family of lightweight hash functions
- The Related-Key Security of Iterated Even–Mansour Ciphers
- The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC
- The geometry of covering codes: small complete caps and saturating sets in Galois spaces
- The iterated random permutation problem with applications to cascade encryption
- The software performance of authenticated-encryption modes
- The “Coefficients H” Technique
- Tight security bounds for key-alternating ciphers
- Topics in cryptology -- CT-RSA 2014. The cryptographer's track at the RSA conference 2014, San Francisco, CA, USA, February 25--28, 2014. Proceedings
- Tweaking Even-Mansour ciphers
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- XPX: generalized tweakable Even-Mansour with improved security guarantees
- \texttt{Midori}: a block cipher for low energy
Cited in
(4)- Proving resistance against invariant attacks: how to choose the round constants
- On invariant subspaces in the Lai-Massey scheme and a primitivity reduction
- Upper bounds on the length function for covering codes with covering radius \(R\) and codimension \(tR+1\)
- Quantum key recovery attacks on tweakable Even-Mansour ciphers
Describes a project that uses
Uses Software
This page was built for publication: On the resilience of Even-Mansour to invariant permutations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q831175)