On the resilience of Even-Mansour to invariant permutations
From MaRDI portal
Publication:831175
DOI10.1007/S10623-021-00850-2zbMath1462.94045OpenAlexW3130355687MaRDI QIDQ831175
Publication date: 10 May 2021
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-021-00850-2
Related Items (2)
Quantum key recovery attacks on tweakable Even-Mansour ciphers ⋮ Upper bounds on the length function for covering codes with covering radius \(R\) and codimension \(tR+1\)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- A practical attack on KeeLoq
- Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8--11, 2015. Revised selected papers
- Almost universal forgery attacks on AES-based MAC's
- Saturated configurations of points in projective Galois spaces
- Sum-free sets in vector spaces over \(GF(2)\)
- Birthday paradox, coupon collectors, caching algorithms and self- organizing search
- Proving resistance against invariant attacks: how to choose the round constants
- Full-state keyed duplex with built-in multi-user support
- Advances in cryptology -- CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14--18, 2011. Proceedings
- Connecting tweakable and multi-key blockcipher security
- Efficient slide attacks
- Topics in cryptology -- CT-RSA 2014. The cryptographer's track at the RSA conference 2014, San Francisco, CA, USA, February 25--28, 2014. Proceedings
- Minimal 1-saturating sets and complete caps in binary projective spaces.
- On defining sets for projective planes
- Cryptanalysis of Ascon
- Midori: A Block Cipher for Low Energy
- Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
- Practical Cryptanalysis of PAES
- Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
- BLAKE2: Simpler, Smaller, Fast as MD5
- Minimizing the Two-Round Even-Mansour Cipher
- The geometry of covering codes: small complete caps and saturating sets in Galois spaces
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- The Related-Key Security of Iterated Even–Mansour Ciphers
- Security of Keyed Sponge Constructions Using a Modular Proof Approach
- Robust Authenticated-Encryption AEZ and the Problem That It Solves
- A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
- Nonlinear Invariant Attack
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function
- The Software Performance of Authenticated-Encryption Modes
- Linear codes with covering radius 2 and other new covering codes
- Tweaking Even-Mansour Ciphers
- Multi-key Security: The Even-Mansour Construction Revisited
- The Iterated Random Permutation Problem with Applications to Cascade Encryption
- The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC
- On the Salsa20 Core Function
- Another Look at Complementation Properties
- Improved Differential Attacks for ECHO and Grøstl
- PRINTcipher: A Block Cipher for IC-Printing
- Inside the Hypercube
- The “Coefficients H” Technique
- Short codes with a given covering radius
- In How Many Ways Can You Write Rijndael?
- New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length
- Constructions and families of covering codes and saturated sets of points in projective geometry
- Keccak
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- The PHOTON Family of Lightweight Hash Functions
- NORX: Parallel and Scalable AEAD
- Advanced Encryption Standard – AES
- CBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ Functions
- Analysis of BLAKE2
- Tight Security Bounds for Key-Alternating Ciphers
- On the Indifferentiability of the Sponge Construction
- Progress in Cryptology - INDOCRYPT 2004
- Block cipher invariants as eigenvectors of correlation matrices
This page was built for publication: On the resilience of Even-Mansour to invariant permutations