Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing.
Benoît CogliatiYannick SeurinPublished in: ASIACRYPT (2) (2015)
Keyphrases
- high security
- block cipher
- stream cipher
- chosen plaintext
- information security
- lower bound
- image encryption
- intrusion detection
- security analysis
- private key
- security policies
- statistical databases
- secure communication
- upper bound
- error bounds
- linear systems
- key management
- security systems
- access control
- objective function