• No results found

[PDF] Top 20 The Related-Key Security of Iterated Even-Mansour Ciphers

Has 10000 "The Related-Key Security of Iterated Even-Mansour Ciphers" found on our website. Below are the top 20 most common "The Related-Key Security of Iterated Even-Mansour Ciphers".

The  Related-Key  Security  of  Iterated  Even-Mansour  Ciphers

The Related-Key Security of Iterated Even-Mansour Ciphers

... single key is used throughout the ...RKA security is fairly strong as, in our opinion, it is unclear what it menas to syntactically changing the RKD functions from those in the ideal setting which have ... See full document

31

Tweaking  Even-Mansour  Ciphers

Tweaking Even-Mansour Ciphers

... two-round iterated Even-Mansour ...the key and the tweak into the state of an Even-Mansour-like construction might be enough to get security beyond the birthday ... See full document

38

Cryptanalysis  of  Iterated  Even-Mansour  Schemes  with  Two  Keys

Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys

... to iterated Even-Mansour ciphers with two keys, we notice that our techniques can also be combined with statistical distin- guishers to give efficient key recovery attacks on certain ... See full document

21

Beyond-Birthday-Bound  Security  for  Tweakable  Even-Mansour  Ciphers  with  Linear  Tweak   and  Key  Mixing

Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing

... birthday-bound security for three rounds. In fact, the security of this construction caps at 2 n/2 queries independently of the number of ...conventional iterated Even-Mansour cipher ... See full document

27

From  Related-Key  Distinguishers  to  Related-Key-Recovery  on  Even-Mansour  Constructions

From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions

... on Even-Mansour ciphers in a related-key model can be extended to much more powerful key-recovery attacks by considering modular additive differences instead of XOR ...on ... See full document

12

On  the  Provable  Security  of  the  Iterated  Even-Mansour  Cipher  against  Related-Key   and  Chosen-Key  Attacks

On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks

... Regarding related-key security, it is natural to ask how to obtain security beyond the birthday bound (note that, by the generic attack of [BK03, Corollary ...master key, this ... See full document

31

Revisiting  Key-alternating  Feistel  Ciphers  for  Shorter  Keys   and  Multi-user  Security

Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security

... n/2 security for a 2-round IEM variant with identical round-permutations and identical round-keys ...somewhat related to KAF: but it can only be transformed into a KAF variant with whitening keys rather ... See full document

35

Multi-key  Analysis  of  Tweakable  Even-Mansour  with  Applications  to  Minalpher   and  OPP

Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP

... As a consequence, a new model that assumes multiple independent keys are equipped individually in the same cryptosystem has more practical significance. Mantin et al. [MS01] capture this by proposing broadcast setting, ... See full document

19

On  the  Indifferentiability  of  Key-Alternating  Feistel  Ciphers  with  No  Key  Derivation

On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation

... the key derivation functions is more attractive, since such key deriva- tions are more relevant to practice than random oracle modeled ...resist related-key attacks (the case is similar to ... See full document

48

A  Salad  of  Block  Ciphers

A Salad of Block Ciphers

... product and iterated block ciphers, rounds, key schedule, avalanche, confusion, diffusion 25.. and the security reduction principle.[r] ... See full document

305

XPX:  Generalized  Tweakable  Even-Mansour  with  Improved  Security  Guarantees

XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees

... the security of E e against any related-key distinguisher D that makes q queries to the con- struction oracle (RK[ E] e k or RKπ) and g r queries to the primitive ...two key-deriving functions ... See full document

34

A  General  Framework  for  the  Related-key  Linear  Attack  against  Block  Ciphers  with  Linear  Key  Schedules

A General Framework for the Related-key Linear Attack against Block Ciphers with Linear Key Schedules

... the related-key linear cryptanalysis on block ciphers with linear key ...the key length of the cipher is much larger than its block ...effective related-key linear attacks ... See full document

30

Short  Non-Malleable  Codes  from  Related-Key  Secure  Block  Ciphers

Short Non-Malleable Codes from Related-Key Secure Block Ciphers

... of related-key attacks on ...(ii) related-key secure with respect to an arbitrary but fixed key ...block ciphers, such as AES-128, making this non-malleable code very efficient ... See full document

17

Minimizing  the  Two-Round  Even-Mansour  Cipher

Minimizing the Two-Round Even-Mansour Cipher

... bound” security for key-alternating ciphers such as AES that do not rely on the assumption that round keys are ...the key-schedule in order to lift the round keys independence assumption in ... See full document

51

Towards  Understanding  the  Known-Key  Security  of  Block  Ciphers

Towards Understanding the Known-Key Security of Block Ciphers

... block ciphers based on idealized primitives such as randomly drawn functions or permutations (examples of such constructions are balanced Feistel ciphers, generalized Feistel ciphers, and (multiple) ... See full document

18

Tweakable  Blockciphers  with  Asymptotically  Optimal  Security

Tweakable Blockciphers with Asymptotically Optimal Security

... an iterated structure to the uniform distribution, and was previously used in cryptography in ...the iterated Even-Mansour cipher by Lampe, Patarin, and Seurin [10], with important differences ... See full document

19

Related-Key  Forgeries  for  Prst-OTR

Related-Key Forgeries for Prst-OTR

... an Even-Mansour block cipher ...an Even- Mansour construction as a block cipher in otherwise secure modes of ...The Even-Mansour approach of creating a block cipher from a ... See full document

16

Improved  Security  Bounds  for  Key-Alternating  Ciphers  via  Hellinger  Distance

Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance

... for the case t = 3, whereas, previously, tight bounds had only been achieved for t = 1 (by Even and Mansour) and for t = 2 (by Bogdanov et al.). Our main technique is an improved analysis of the elegant ... See full document

16

A  Synthetic  Indifferentiability  Analysis  of  Interleaved  Double-Key  Even-Mansour  Ciphers

A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers

... general” key schedules; however, for the first time, these results indeed validate the (seem- ingly long standing) design principle to some extent in the open-key model, ...from key-alternating ... See full document

53

Multi-Key  Security:  The  Even-Mansour  Construction  Revisited

Multi-Key Security: The Even-Mansour Construction Revisited

... “simple” key schedule is that keys should be chosen uni- formly at random from the entire key space anyway, in order to avoid a speed-up of brute-force attacks due to low key ...one key ... See full document

16

Show all 10000 documents...