搜索结果: 1-7 共查到“Even-Mansour ciphers”相关记录7条 . 查询时间(0.125 秒)
New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers
block cipher Even-Mansour ciphers meet-in-the-middle attack
2017/9/14
Chen et al. proved that two variants of the two-round n-bit Even-Mansour ciphers are secure up to 22n/3 queries against distinguish- ing attacks. These constructions can be regarded as minimal two-rou...
Security of Even--Mansour Ciphers under Key-Dependent Messages
Even--Mansour KDM security Ideal Cipher
2017/5/31
The iterated Even--Mansour (EM) ciphers form the basis of many block cipher designs. Several results have established their security in the CPA/CCA models, under related-key attacks, and in the indiff...
Balanced permutations Even-Mansour ciphers
Even-Mansour cipher block ciphers random permutations
2016/1/7
The r-rounds Even-Mansour block cipher uses r public permutations of {0,1}n and r+1 secret keys. An attack on this construction was described in \cite{DDKS}, for r=2,3. Although this attack is only ma...
The Related-Key Security of Iterated Even-Mansour Ciphers
Even–Mansour related-key attack public permutation
2016/1/5
The simplicity and widespread use of blockciphers based on the iterated Even–Mansour (EM)
construction has sparked recent interest in the theoretical study of their security. Previous work has
estab...
Tweaking Even-Mansour Ciphers
tweakable block cipher CLRW construction key-alternating cipher
2015/12/30
We study how to construct efficient tweakable block ciphers in the Random Permutation model, where all parties have access to public random permutation oracles. We propose a construction that combines...
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
tweakable block cipher iterated Even-Mansour cipher key-alternating cipher
2015/12/23
The iterated Even-Mansour construction defines a block cipher from a tuple of public $n$-bit permutations $(P_1,\ldots,P_r)$ by alternatively xoring some $n$-bit round key $k_i$, $i=0,\ldots,r$, and a...
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
blockcipher ideal cipher indifferentiability
2015/12/23
Iterated Even-Mansour scheme (IEM) is a generalization of
the basic 1-round proposal (ASIACRYPT ’91). The scheme can use one
key, two keys, or completely independent keys.