Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing.
Benoit CogliatiYannick SeurinPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- high security
- block cipher
- stream cipher
- access control
- image encryption
- secure communication
- security issues
- security protocols
- information security
- upper bound
- security requirements
- information systems
- network security
- key management
- security policies
- linear functions
- private key
- secret key
- security analysis
- security mechanisms
- linear systems
- concept learning
- worst case
- lower bound