• No results found

[PDF] Top 20 Multi-Key Security: The Even-Mansour Construction Revisited

Has 10000 "Multi-Key Security: The Even-Mansour Construction Revisited" found on our website. Below are the top 20 most common "Multi-Key Security: The Even-Mansour Construction Revisited".

Multi-Key  Security:  The  Even-Mansour  Construction  Revisited

Multi-Key Security: The Even-Mansour Construction Revisited

... the Even-Mansour block cipher avoids that round keys need to be precalculated and stored in memory, or that they need to be calculated ...the key schedule results in a higher key agility, ... See full document

16

From  Related-Key  Distinguishers  to  Related-Key-Recovery  on  Even-Mansour  Constructions

From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions

... same construction lends itself to trivial distinguishing attacks, and one must consider alternatives if security in this model is ...the Even-Mansour construction was proved to be ... See full document

12

XPX:  Generalized  Tweakable  Even-Mansour  with  Improved  Security  Guarantees

XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees

... Related-Key Security of XEX and TEM. XEX resists related-key attacks if the underlying blockcipher is sufficiently related-key ...if Even-Mansour is plugged into XEX, as is done ... See full document

34

Cryptanalysis  of  Iterated  Even-Mansour  Schemes  with  Two  Keys

Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys

... alternating key scheme which improve over exhaustive search by a significant ...mn-bit security can be achieved for n-bit iterated EM constructions with m independent keys? ... See full document

21

Multi-user  collisions:  Applications  to  Discrete  Logarithm,  Even-Mansour   and  PRINCE

Multi-user collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE

... as key exchange, public-key encryption and ...between security proofs for message authen- tication code in the single-user and in the multi-user ...the security proof for one user and ... See full document

20

Minimizing  the  Two-Round  Even-Mansour  Cipher

Minimizing the Two-Round Even-Mansour Cipher

... the key-schedule simply consists in xoring constants to the master key) in this ...Hence, construction (?) can be regarded as a “minimal” two-round Even-Mansour cipher delivering ... See full document

51

Multi-Key  Searchable  Encryption,  Revisited

Multi-Key Searchable Encryption, Revisited

... Bob’s security to be ...the security game designed to capture query privacy in this setting [PZ13, ...every construction which realizes this syntax ...share key ∆ is generated. The share ... See full document

35

Tweaking  Even-Mansour  Ciphers

Tweaking Even-Mansour Ciphers

... TEM construction for any number r > 2 of rounds (a first, hopefully simpler step towards this goal would be to give a tight bound for the CLRW construction for r > ...iterated ... See full document

38

Multi-user  Schnorr  security,  revisited

Multi-user Schnorr security, revisited

... Beware that several variations of this definition appear in the literature. Some- times Sign is allowed to maintain state, i.e., to output a new secret key that is then used as a replacement for the original ... See full document

19

Beyond-Birthday-Bound  Security  for  Tweakable  Even-Mansour  Ciphers  with  Linear  Tweak   and  Key  Mixing

Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing

... birthday-bound security for three rounds. In fact, the security of this construction caps at 2 n/2 queries independently of the number of ...iterated Even-Mansour cipher with the ... See full document

27

Related  Randomness  Security  for  Public  Key  Encryption,  Revisited

Related Randomness Security for Public Key Encryption, Revisited

... RRA security), the simple randomized- encrypt-with-hash (REwH) scheme by Bellare et ...RRA security in the random oracle model (however, as will be explained below, this construction still suffers ... See full document

30

Formalization  of  Information-Theoretic  Security  for  Encryption   and  Key  Agreement,  Revisited

Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited

... information-theoretic security for symmetric-key en- cryption and key agreement protocols which are very fundamental primitives in ...information-theoretic security in various ways: some of ... See full document

32

Chaskey:  An  Efficient  MAC  Algorithm  for 32-bit  Microcontrollers

Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers

... Evaluations. Even and Mansour [35, 36] proved that any attack on their construction requires about T block cipher evaluations and 2 n /D known ...a key recovery attack on the ... See full document

18

The  Multi-user  Security  of  GCM,  Revisited:  Tight  Bounds  for  Nonce  Randomization

The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization

... of multi-user (mu) security, introduced by Biham [6] in symmetric cryptanalysis and by Bellare, Boldyreva, and Micali [3] in public-key cryptography, deals with such ...how security degrades ... See full document

23

Related-Key  Forgeries  for  Prst-OTR

Related-Key Forgeries for Prst-OTR

... an Even-Mansour block cipher ...an Even- Mansour construction as a block cipher in otherwise secure modes of ...The Even-Mansour approach of creating a block cipher from a ... See full document

16

On  the  Provable  Security  of  the  Iterated  Even-Mansour  Cipher  against  Related-Key   and  Chosen-Key  Attacks

On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks

... This construction has also been shown to be (fully) indifferentiable from an ideal cipher for a sufficient number of rounds (five or twelve depending on the assumptions on the ...iterated ... See full document

31

The  Related-Key  Security  of  Iterated  Even-Mansour  Ciphers

The Related-Key Security of Iterated Even-Mansour Ciphers

... EM construction is indifferentiable from the ideal cipher when a single key is used throughout the ...in multi-stage settings and go on to note that the RKA game is ...the construction only, ... See full document

31

On  the  Provable  Security  of  the  Tweakable  Even-Mansour  Cipher  Against  Multi-Key   and  Related-Key  Attacks

On the Provable Security of the Tweakable Even-Mansour Cipher Against Multi-Key and Related-Key Attacks

... tweakable Even-Mansour cipher with (ϵ, δ)-RKA-AXU-hash functions is related-key-secure up to D(D − 1)ϵ + 2DT δ queries, where D is the complexity of construction queries (data complexity) and ... See full document

18

Multi-key  Analysis  of  Tweakable  Even-Mansour  with  Applications  to  Minalpher   and  OPP

Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP

... the multi-key setting is more close to practice than the broadcast and multi- user setting (also than the usual single-key/related key ...that even for a single user, she may ... See full document

19

The Blömer-May’s Weak Key Revisited

The Blömer-May’s Weak Key Revisited

... Historically, since the 1990s, the small private exponents had paid attention on RSA key generation. Wiener (1990) particularly introduced an attack on small private exponents. In the analysis of small private ... See full document

7

Show all 10000 documents...