tweakey
From MaRDI portal
Software:24740
swMATH12816MaRDI QIDQ24740FDOQ24740
Author name not available (Why is that?)
Cited In (36)
- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
- On the resilience of Even-Mansour to invariant permutations
- Lightweight authenticated encryption mode suitable for threshold implementation
- TNT: how to tweak a block cipher
- Impossible Differential Cryptanalysis of Reduced-Round SKINNY
- Tight security of cascaded LRW2
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Connecting tweakable and multi-key blockcipher security
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption
- Towards closing the security gap of Tweak-aNd-Tweak (TNT)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function
- Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3
- Analysis of the CAESAR Candidate Silver
- The \texttt{Deoxys} AEAD family
- The State of the Authenticated Encryption
- Authenticated Encryption with Small Stretch (or, How to Accelerate AERO)
- Key recovery attacks on reduced-round Joltik-BC in the single-key setting
- Tweak-Length Extension for Tweakable Blockciphers
- Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- SPF: A New Family of Efficient Format-Preserving Encryption Algorithms
- Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch
- Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY}
- Tweaking Even-Mansour Ciphers
- Square Attack on 7-Round Kiasu-BC
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- Efficient and Provable White-Box Primitives
- Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher
- Biclique Attack of Block Cipher SKINNY
- Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE
This page was built for software: tweakey