1 |
A. Bogdanov, L. R. Knudsen, G. Leander, F. Standaert, J. Steinberger and E. Tischhauser, "Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations", Proceedings of EUROCRYPT 2012, LNCS Vol. 7237, pp. 45-62, 2012.
|
2 |
A. Biryukov and D. Wagner, "Advanced Slide Attacks", Proceedings of EUROCRYPT 2000, LNCS Vol. 1807, pp. 589-606, 2000.
|
3 |
S. Chen, R. Lampe, J. Lee, Y. Seurin and J. P. Steinberger, "Minimizing the tworound Even-Mansour cipher", Proceedings of CRYPTO 2014, LNCS Vol. 8616, pp. 39-56, 2014.
|
4 |
S. Chen and J. P. Steinberger, "Tight Security Bounds for Key-Alternating Ciphers", Proceedings of EUROCRYPT 2014, LNCS Vol. 8441, pp. 327-350, 2014.
|
5 |
J. Daemen, "Limitations of the Even-Mansour Construction", Proceedings of ASIACRYPT 1991, LNCS Vol. 739, pp. 495-498, 1993.
|
6 |
I. Dinur, O. Dunkelman, N. Keller and A. Shamir, " Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2", Proceedings of ASIACRYPT 2013, LNCS Vol. 8269, pp. 337-356, 2013.
|
7 |
I. Dinur, O. Dunkelman, N. Keller and A. Shamir, "Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys", Proceedings of ASIACRYPT 2014, LNCS Vol. 8873, pp. 439-457, 2014.
|
8 |
O. Dunkelman, N. Keller and A. Shamir, "Minimalism in Cryptography: The Even-Mansour Scheme Revisited", Proceedings of EUROCRYPT 2012, LNCS Vol. 7237, pp. 336-354, 2012.
|
9 |
Y. Dai, J. Lee, B. Mennink and J. P. Steinberger, "The Security of Multiple Encryption in the Ideal Cipher Model", Proceedings of CRYPTO 2014, LNCS Vol. 8616, pp. 20-38, 2014.
|
10 |
S. Even and Y. Mansour, "A Construction of a Cipher From a Single Pseudorandom Permutation", Proceedings of ASIACRYPT 1991, LNCS Vol. 739, pp. 210-224, 1993.
|
11 |
A. Biryukov, C. De Canniere, A. Braeken and B. Preneel, "A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms", Proceedings of EUROCRYPT 2003, LNCS Vol. 2656, pp. 33-50, 2003.
|
12 |
S. Even and Y. Mansour, "A Construction of a Cipher from a Single Pseudorandom Permutation", Journal of Cryptology 10(3), pp. 151-162, 1997.
DOI
|
13 |
P. Gazi and S. Tessaro, "Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading", Proceedings of EUROCRYPT 2012, LNCS Vol. 7237, pp. 63-80, 2012.
|
14 |
H. Kim, "Simplification on Even-Mansour Scheme Attacks", Journal of Information and Security, Vol. 16, No. 7, pp. 85-91, 2016.
|
15 |
S. Noh, "A Study of DES(Data Encryption Standard) Property, Diagnosis and How to Apply Enhanced Symmetric Key Encryption Algorithm", Journal of Information and Security, Vol. 12, No. 4, pp. 85-90, 2012.
|
16 |
E. Andreeva, A. Bogdanov, Y. Dodis, B. Mennink and J. P. Steinberger, "On the Indifferentiability of Key-Alternating Ciphers", Proceedings of CRYPTO 2013, LNCS Vol. 8042, pp. 531-550, 2013.
|