Tweakable block ciphers
… for tweakable block ciphers. In Section 3 we suggest several ways of … tweakable block
ciphers from existing block ciphers, and prove that the existence of tweakable block ciphers is …
ciphers from existing block ciphers, and prove that the existence of tweakable block ciphers is …
Tweakable block ciphers
… His security requirement is thus very close to what is proposed in this paper for a basic
tweakable block cipher; our definition of strong security for a tweakable block cipher extends this …
tweakable block cipher; our definition of strong security for a tweakable block cipher extends this …
Counter-in-tweak: authenticated encryption modes for tweakable block ciphers
… }\)) mode, which turns a tweakable block cipher into a nonce-… input of the underlying tweakable
block cipher rather than on … ^n\) tweakable block cipher calls, where n is the block length, …
block cipher rather than on … ^n\) tweakable block cipher calls, where n is the block length, …
Online ciphers from tweakable blockciphers
P Rogaway, H Zhang - Cryptographers' Track at the RSA Conference, 2011 - Springer
… T ,n) as blockciphers, ciphers, and tweakable blockciphers, respectively; they are the ideal
blockcipher on n bits, the ideal cipher on M, and the ideal tweakable blockcipher on n bits and …
blockcipher on n bits, the ideal cipher on M, and the ideal tweakable blockcipher on n bits and …
A security analysis of Deoxys and its internal tweakable block ciphers
… Finally, we discuss how these attacks on the internal tweakable block ciphers can be
applied to the entire AE scheme. We argue that our attacks are difficult to extend to …
applied to the entire AE scheme. We argue that our attacks are difficult to extend to …
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
… to unify the design of tweakable block ciphers and of block ciphers resistant to relatedkey …
, where a regular block cipher was used as a black box to build a tweakable block cipher. Our …
, where a regular block cipher was used as a black box to build a tweakable block cipher. Our …
Optimally secure tweakable blockciphers
B Mennink - Fast Software Encryption: 22nd International Workshop …, 2015 - Springer
… We show that any such tweakable cipher can be attacked by an information-theoretic
distinguisher in at most \(2^{n/2}\) queries, and thus that provable security beyond this bound …
distinguisher in at most \(2^{n/2}\) queries, and thus that provable security beyond this bound …
Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC
P Rogaway - International Conference on the Theory and …, 2004 - Springer
… We show that E is secure (as a strong, tweakable … of tweakable blockciphers during mode
design, followed by the instantiation of the tweakable blockcipher with an ordinary blockcipher …
design, followed by the instantiation of the tweakable blockcipher with an ordinary blockcipher …
Tweakable blockciphers with beyond birthday-bound security
W Landecker, T Shrimpton, RS Terashima - Annual Cryptology …, 2012 - Springer
… Our main technical result is the first TBC construction that has strong tweakable-PRP security
beyond the birthday bound, admits essentially arbitrary tweaks, and does not require per-…
beyond the birthday bound, admits essentially arbitrary tweaks, and does not require per-…
CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks
… In this work we present the tweakable block cipher CRAFT: the efficient protection of its …
implementations, CRAFT outperforms the other lightweight ciphers with the same state and key …
implementations, CRAFT outperforms the other lightweight ciphers with the same state and key …
Related searches
- tweakable block ciphers authenticated encryption modes
- lightweight tweakable block ciphers
- tweakable block ciphers aes
- tweakable block ciphers cryptology
- tweakable block ciphers authentication
- block cipher companion
- block cipher dfa attacks
- block ciphers fault template attacks
- skinny family of block ciphers
- block ciphers fault protection
- block ciphers security analysis
- tweakable blockciphers online ciphers
- block ciphers unproved hypotheses
- block cipher efficient protection
- construction of block ciphers