Tight Security Bounds for Key-Alternating Ciphers
暂无分享,去创建一个
[1] Yannick Seurin,et al. How to Construct an Ideal Cipher from a Small Set of Public Permutations , 2013, ASIACRYPT.
[2] Yishay Mansour,et al. A Construction of a Cioher From a Single Pseudorandom Permutation , 1991, ASIACRYPT.
[3] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[4] Stefano Tessaro,et al. Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading , 2012, IACR Cryptol. ePrint Arch..
[5] Phillip Rogaway,et al. How to Encipher Messages on a Small Domain , 2009, CRYPTO.
[6] Yannick Seurin,et al. An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher , 2012, ASIACRYPT.
[7] Jacques Patarin,et al. The "Coefficients H" Technique , 2009, Selected Areas in Cryptography.
[8] Vincent Rijmen,et al. The Wide Trail Design Strategy , 2001, IMACC.
[9] John P. Steinberger,et al. Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance , 2012, IACR Cryptol. ePrint Arch..
[10] Joe Kilian,et al. How to Protect DES Against Exhaustive Key Search (an Analysis of DESX) , 2015, Journal of Cryptology.
[11] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[12] Joan Daemen,et al. Limitations of the Even-Mansour Construction , 1991, ASIACRYPT.
[13] Ueli Maurer,et al. Indistinguishability Amplification , 2007, CRYPTO.
[14] Serge Vaudenay,et al. Decorrelation: A Theory for Block Cipher Security , 2003, Journal of Cryptology.
[15] Peter Gazi,et al. Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers , 2013, CRYPTO.
[16] John P. Steinberger,et al. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations , 2012, IACR Cryptol. ePrint Arch..
[17] Ueli Maurer,et al. Composition of Random Systems: When Two Weak Make One Strong , 2004, TCC.
[18] Yishay Mansour,et al. A construction of a cipher from a single pseudorandom permutation , 1997, Journal of Cryptology.