Tweakable block ciphers

M Liskov, RL Rivest, D Wagner - … Barbara, California, USA, August 18–22 …, 2002 - Springer
… for tweakable block ciphers. In Section 3 we suggest several ways of … tweakable block
ciphers from existing block ciphers, and prove that the existence of tweakable block ciphers is …

Tweakable block ciphers

M Liskov, RL Rivest, D Wagner - Journal of cryptology, 2011 - Springer
… His security requirement is thus very close to what is proposed in this paper for a basic
tweakable block cipher; our definition of strong security for a tweakable block cipher extends this …

Counter-in-tweak: authenticated encryption modes for tweakable block ciphers

T Peyrin, Y Seurin - Annual International Cryptology Conference, 2016 - Springer
… }\)) mode, which turns a tweakable block cipher into a nonce-… input of the underlying tweakable
block cipher rather than on … ^n\) tweakable block cipher calls, where n is the block length, …

Online ciphers from tweakable blockciphers

P Rogaway, H Zhang - Cryptographers' Track at the RSA Conference, 2011 - Springer
… T ,n) as blockciphers, ciphers, and tweakable blockciphers, respectively; they are the ideal
blockcipher on n bits, the ideal cipher on M, and the ideal tweakable blockcipher on n bits and …

A security analysis of Deoxys and its internal tweakable block ciphers

C Cid, T Huang, T Peyrin, Y Sasaki… - IACR Transactions on …, 2017 - tosc.iacr.org
… Finally, we discuss how these attacks on the internal tweakable block ciphers can be
applied to the entire AE scheme. We argue that our attacks are difficult to extend to …

Tweaks and Keys for Block Ciphers: The TWEAKEY Framework

J Jean, I Nikolić, T Peyrin - … 2014: 20th International Conference on the …, 2014 - Springer
… to unify the design of tweakable block ciphers and of block ciphers resistant to relatedkey …
, where a regular block cipher was used as a black box to build a tweakable block cipher. Our …

Optimally secure tweakable blockciphers

B Mennink - Fast Software Encryption: 22nd International Workshop …, 2015 - Springer
… We show that any such tweakable cipher can be attacked by an information-theoretic
distinguisher in at most \(2^{n/2}\) queries, and thus that provable security beyond this bound …

Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC

P Rogaway - International Conference on the Theory and …, 2004 - Springer
… We show that E is secure (as a strong, tweakable … of tweakable blockciphers during mode
design, followed by the instantiation of the tweakable blockcipher with an ordinary blockcipher

Tweakable blockciphers with beyond birthday-bound security

W Landecker, T Shrimpton, RS Terashima - Annual Cryptology …, 2012 - Springer
… Our main technical result is the first TBC construction that has strong tweakable-PRP security
beyond the birthday bound, admits essentially arbitrary tweaks, and does not require per-…

CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks

C Beierle, G Leander, A Moradi… - IACR Transactions on …, 2019 - orbilu.uni.lu
… In this work we present the tweakable block cipher CRAFT: the efficient protection of its …
implementations, CRAFT outperforms the other lightweight ciphers with the same state and key …