Tweaking key-alternating Feistel block ciphers
From MaRDI portal
Recommendations
- Optimally secure tweakable blockciphers
- Tweakable blockciphers with asymptotically optimal security
- Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model
- Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security
- Tweakable Blockciphers with Beyond Birthday-Bound Security
Cites work
- scientific article; zbMATH DE number 697813 (Why is no real title available?)
- scientific article; zbMATH DE number 1942411 (Why is no real title available?)
- scientific article; zbMATH DE number 1759261 (Why is no real title available?)
- scientific article; zbMATH DE number 2087596 (Why is no real title available?)
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Advances in Cryptology - CRYPTO 2003
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions
- Feistel ciphers. Security proofs and cryptanalysis
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach
- How to build fully secure tweakable blockciphers from classical blockciphers
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- Improved Security Analysis of XEX and LRW Modes
- Information Security and Cryptology
- Key-alternating ciphers and key-length extension: exact bounds and multi-user security
- On Tweaking Luby-Rackoff Blockciphers
- On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
- Online ciphers from tweakable blockciphers
- Parallelizable and authenticated online ciphers
- Progress in Cryptology - INDOCRYPT 2004
- Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security
- Security analysis of key-alternating Feistel ciphers
- The Related-Key Security of Iterated Even–Mansour Ciphers
- The “Coefficients H” Technique
- Tight security bounds for key-alternating ciphers
- Topics in Cryptology – CT-RSA 2004
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- Tweakable Enciphering Schemes from Hash-Sum-Expansion
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
- Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model
- Tweakable blockciphers with asymptotically optimal security
- Tweaking Even-Mansour ciphers
- Tweaking key-alternating Feistel block ciphers
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- XPX: generalized tweakable Even-Mansour with improved security guarantees
Cited in
(6)- TNT: how to tweak a block cipher
- Tweaking AES
- Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Tweaking key-alternating Feistel block ciphers
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
This page was built for publication: Tweaking key-alternating Feistel block ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2229265)