Pages that link to "Item:Q4314059"
From MaRDI portal
The following pages link to Limitations of the Even-Mansour construction (Q4314059):
Displaying 23 items.
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour (Q306057) (← links)
- Key recovery attacks on iterated Even-Mansour encryption schemes (Q321305) (← links)
- Tweakable block ciphers (Q451118) (← links)
- Almost universal forgery attacks on AES-based MAC's (Q494579) (← links)
- Orthomorphisms of abelian groups with minimum possible pairwise distances (Q783118) (← links)
- A construction of a cipher from a single pseudorandom permutation. (Q1364898) (← links)
- An improved affine equivalence algorithm for random permutations (Q1648807) (← links)
- Minimizing the two-round Even-Mansour cipher (Q1994640) (← links)
- Slidex attacks on the Even-Mansour encryption scheme (Q2018815) (← links)
- The limited deficit method and the problem of constructing orthomorphisms and almost orthomorphisms of abelian groups (Q2064375) (← links)
- Optimum attack on 3-round Feistel-2 structure (Q2128756) (← links)
- Beyond quadratic speedups in quantum attacks on symmetric schemes (Q2170092) (← links)
- Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem (Q2188960) (← links)
- Rotational cryptanalysis on MAC algorithm chaskey (Q2229269) (← links)
- Connecting tweakable and multi-key blockcipher security (Q2413014) (← links)
- Tight security analysis of 3-round key-alternating cipher with a single permutation (Q2692361) (← links)
- Cryptanalysis of the Full 8.5-Round REESSE3+ Block Cipher (Q2946448) (← links)
- Cryptanalysis of Round-Reduced $$\mathtt{LED}$$ (Q2946874) (← links)
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers (Q2958133) (← links)
- WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction (Q2975812) (← links)
- Quantum query lower bounds for key recovery attacks on the Even-Mansour cipher (Q6591613) (← links)
- Algebraic attacks on round-reduced \textsc{Rain} and full \textsf{AIM-III} (Q6595816) (← links)
- Speeding up preimage and key-recovery attacks with highly biased differential-linear approximations (Q6652910) (← links)