tweakey
From MaRDI portal
Software:24740
swMATH12816MaRDI QIDQ24740FDOQ24740
Author name not available (Why is that?)
Cited In (36)
- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
- On the resilience of Even-Mansour to invariant permutations
- Statistical fault attacks on nonce-based authenticated encryption schemes
- Lightweight authenticated encryption mode suitable for threshold implementation
- TNT: how to tweak a block cipher
- Tight security of cascaded LRW2
- Impossible differential cryptanalysis of reduced-round tweakable TWINE
- Tweak-length extension for tweakable blockciphers
- How to build fully secure tweakable blockciphers from classical blockciphers
- Analysis of the CAESAR candidate silver
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Tweaking Even-Mansour ciphers
- The state of the authenticated encryption
- Authenticated encryption with small stretch (or, how to accelerate AERO)
- SPF: a new family of efficient format-preserving encryption algorithms
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch
- Square attack on 7-round Kiasu-BC
- Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC
- Connecting tweakable and multi-key blockcipher security
- Biclique attack of block cipher \texttt{SKINNY}
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption
- Towards closing the security gap of Tweak-aNd-Tweak (TNT)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function
- Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3
- The \texttt{Deoxys} AEAD family
- Key recovery attacks on reduced-round Joltik-BC in the single-key setting
- Impossible differential cryptanalysis of reduced-round \texttt{SKINNY}
- Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY}
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- Efficient and Provable White-Box Primitives
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher
This page was built for software: tweakey