The following pages link to (Q4314029):
Displaying 35 items.
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour (Q306057) (← links)
- AKF: a key alternating Feistel scheme for lightweight cipher designs (Q477688) (← links)
- Reflection ciphers (Q510444) (← links)
- An analysis of the blockcipher-based hash functions from PGV (Q604636) (← links)
- Orthomorphisms of abelian groups with minimum possible pairwise distances (Q783118) (← links)
- Noisy Simon period finding (Q826245) (← links)
- The key-dependent message security of key-alternating Feistel ciphers (Q826271) (← links)
- On the resilience of Even-Mansour to invariant permutations (Q831175) (← links)
- What is the effective key length for a block cipher: an attack on every practical block cipher (Q893734) (← links)
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code (Q1698650) (← links)
- Key alternating ciphers based on involutions (Q1744011) (← links)
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks (Q1749800) (← links)
- Slidex attacks on the Even-Mansour encryption scheme (Q2018815) (← links)
- The limited deficit method and the problem of constructing orthomorphisms and almost orthomorphisms of abelian groups (Q2064375) (← links)
- Optimum attack on 3-round Feistel-2 structure (Q2128756) (← links)
- Counting active S-boxes is not enough (Q2152037) (← links)
- Tweaking key-alternating Feistel block ciphers (Q2229265) (← links)
- Rotational cryptanalysis on MAC algorithm chaskey (Q2229269) (← links)
- Quantum attacks on sum of Even-Mansour pseudorandom functions (Q2234803) (← links)
- Connecting tweakable and multi-key blockcipher security (Q2413014) (← links)
- Reflection cryptanalysis of PRINCE-like ciphers (Q2516533) (← links)
- Quantum attacks against BBB secure PRFs or MACs built from public random permutations (Q2686166) (← links)
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption (Q2692358) (← links)
- Key-Recovery Attacks Against the MAC Algorithm Chaskey (Q2807207) (← links)
- Linicrypt: A Model for Practical Cryptography (Q2829955) (← links)
- Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security (Q2835581) (← links)
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees (Q2835583) (← links)
- Towards Understanding the Known-Key Security of Block Ciphers (Q2946886) (← links)
- Selective Opening Security from Simulatable Data Encapsulation (Q2953779) (← links)
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function (Q2958116) (← links)
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers (Q2958133) (← links)
- A Domain Extender for the Ideal Cipher (Q3408200) (← links)
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs (Q3593109) (← links)
- Collision Resistant Double-Length Hashing (Q4933214) (← links)
- Security/Efficiency Tradeoffs for Permutation-Based Hashing (Q5458594) (← links)