Results 11 to 20 of about 15,909 (208)

Generalized Feistel Structures Based on Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2022
A generalized Feistel structure (GFS) is a classical approach to construct a block cipher from pseudorandom functions (PRFs). Coron et al. at TCC 2010 instantiated a Feistel structure with a tweakable block cipher (TBC), and presented its provable ...
Kazuki Nakaya, Tetsu Iwata
doaj   +6 more sources

Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model [PDF]

open access: yesIACR Cryptology ePrint Archive, 2018
We propose a new construction of tweakable block ciphers from standard block ciphers. Our construction, dubbed XHX2, is the cascade of two independent XHX block ciphers, so it makes two call to the underlying block cipher using tweak-dependent keys.
B Cogliati   +15 more
core   +3 more sources

Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks [PDF]

open access: yesAnnual International Cryptology Conference, 2018
Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a wn-bit block cipher from n-bit public permutations (often called S-boxes), which alternate keyless and “local” substitution steps utilizing such S-boxes, with keyed
Cogliati, Benoît-Michel   +6 more
core   +5 more sources

Efficient Length Doubling From Tweakable Block Ciphers [PDF]

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We present a length doubler, LDT, that turns an n-bit tweakable block cipher into an efficient and secure cipher that can encrypt any bit string of length [n..2n − 1].
Yu Long Chen   +3 more
doaj   +5 more sources

New Constructions of MACs from (Tweakable) Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional block ciphers. Our new schemes are either stateless and deterministic, nonce-based, or randomized, and provably secure either in the standard model for ...
Benoît Cogliati   +2 more
doaj   +4 more sources

Tweakable ForkCipher from Ideal Block Cipher

open access: yesIACR Communications in Cryptology
In ASIACRYPT 2019, Andreeva et al. introduced a new symmetric key primitive called the forkcipher, designed for lightweight applications handling short messages. A forkcipher is a keyed function with a public tweak, featuring fixed-length input and fixed-
Sougata Mandal
semanticscholar   +2 more sources

Almost-Minimal-Round BBB-Secure Tweakable Key-Alternating Feistel Block Cipher [PDF]

open access: yesSymmetry, 2021
This paper focuses on designing a tweakable block cipher via by tweaking the Key-Alternating Feistel (KAF for short) construction. Very recently Yan et al. published a tweakable KAF construction.
Ming Jiang, Lei Wang
semanticscholar   +2 more sources

Context-Committing Authenticated Encryptions Using Tweakable Stream Cipher

open access: yesIEEE Access
Committing security of authenticated encryption schemes is an emerging area and an active field of research and is highly motivated by real-world scenarios.
Donghoon Chang, Munawar Hasan
doaj   +2 more sources

Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model [PDF]

open access: yes, 2018
In this paper, we present a generic construction to create a secure tweakable block cipher from a secure block cipher. Our construction is very natural, requiring four calls to the underlying block cipher for each call of the tweakable block cipher ...
Cogliati, Benoît-Michel
core   +3 more sources

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion [PDF]

open access: yesIACR Transactions on Symmetric Cryptology, 2019
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights.
Ralph Ankele   +5 more
semanticscholar   +7 more sources

Home - About - Disclaimer - Privacy