搜索结果: 1-15 共查到“军事学 Even-Mansour”相关记录24条 . 查询时间(0.5 秒)
Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem
Even-Mansour Cryptanalysis 3-XOR
2019/8/19
The iterated Even-Mansour construction is an elegant construction that idealizes block cipher designs such as the AES. In this work we focus on the simplest variant, the 2-round Even-Mansour construct...
New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers
block cipher Even-Mansour ciphers meet-in-the-middle attack
2017/9/14
Chen et al. proved that two variants of the two-round n-bit Even-Mansour ciphers are secure up to 22n/3 queries against distinguish- ing attacks. These constructions can be regarded as minimal two-rou...
Security of Even--Mansour Ciphers under Key-Dependent Messages
Even--Mansour KDM security Ideal Cipher
2017/5/31
The iterated Even--Mansour (EM) ciphers form the basis of many block cipher designs. Several results have established their security in the CPA/CCA models, under related-key attacks, and in the indiff...
Generalized Tweakable Even-Mansour Cipher with Strong Security Guarantee and Its Applications
Tweakable Even-Mansour almost-XOR-universal hash functions HPH
2017/2/20
We present a generalized tweakable blockcipher HPH, which is constructed from a public random permutation PP and an almost-XOR-universal (AXU) hash function HH with a tweak and key schedule (t1,t2,K)∈...
Five Rounds are Sufficient and Necessary for the Indifferentiability of Iterated Even-Mansour
block cipher ideal cipher iterated Even-Mansour
2017/2/20
We prove that the 5-round iterated Even-Mansour (IEM) construction (which captures the high-level structure of the class of key-alternating ciphers) with a non-idealized key-schedule (such as the triv...
On the Provable Security of the Tweakable Even-Mansour Cipher Against Multi-Key and Related-Key Attacks
Tweakable Even-Mansour almost-XOR-universal hash functions multi-key attack
2016/12/29
Cogliati et al. introduced the tweakable Even-Mansour cipher constructed from a single permutation and an almost-XOR-universal (AXU) family of hash functions with tweak and key schedule. Most of previ...
Indifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation
blockcipher ideal cipher indifferentiability
2016/12/9
We revisit the Even-Mansour (EM) scheme with random oracle key derivation previously considered by Andreeva et al. (CRYPTO 2013). For this scheme, Andreeva et al. provided an indifferentiability (from...
Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP
Collision-based Cryptanalysis Minalpher OPP
2016/12/7
The tweakable Even-Mansour construction generalizes the conventional Even-Mansour scheme through replacing round keys by strings derived from a master key and a tweak. Besides providing plenty of inhe...
Towards a Characterization of the Related-Key Attack Security of the Iterated Even-Mansour Cipher
Iterated Even-Mansour cipher related-key attack
2016/7/20
We prove the related-key security of the Iterated Even-Mansour cipher under broad classes of related key derivation (RKD) functions. Our result extends the classes of RKD functions considered by Farsh...
The QARMA Block Cipher Family -- Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes
Tweakable Block Ciphers Almost MDS Matrices Even-Mansour Schemes
2016/5/9
We introduce and analyse a family of Almost MDS matrices defined over a ring with zero divisors that allows us to encode rotations in its operation while maintaining the minimal latency associated to ...
Minimizing the Two-Round Even-Mansour Cipher
generalized Even-Mansour cipher key-alternating cipher indistinguishability
2016/1/9
The r-round (iterated) Even-Mansour cipher (also known as key-alternating cipher)
defines a block cipher from r fixed public n-bit permutations P1, . . . , Pr as follows: given a sequence
of n-bit r...
Balanced permutations Even-Mansour ciphers
Even-Mansour cipher block ciphers random permutations
2016/1/7
The r-rounds Even-Mansour block cipher uses r public permutations of {0,1}n and r+1 secret keys. An attack on this construction was described in \cite{DDKS}, for r=2,3. Although this attack is only ma...
The Related-Key Security of Iterated Even-Mansour Ciphers
Even–Mansour related-key attack public permutation
2016/1/5
The simplicity and widespread use of blockciphers based on the iterated Even–Mansour (EM)
construction has sparked recent interest in the theoretical study of their security. Previous work has
estab...
On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks
block cipher ideal cipher related-key attacks
2016/1/4
The iterated Even-Mansour cipher is a construction of a block cipher from r public permutations P1,…,Pr which abstracts in a generic way the structure of key-alternating ciphers. The indistinguishabil...
Multi-Key Security: The Even-Mansour Construction Revisited
Even-Mansour multi-key setting broadcast attack
2016/1/4
At ASIACRYPT 1991, Even and Mansour introduced a block
cipher construction based on a single permutation. Their construction
has since been lauded for its simplicity, yet also criticized for not pro...