Sign in

Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes.

Itai DinurOrr DunkelmanNathan KellerAdi Shamir
Published in: J. Cryptol. (2016)
Keyphrases
  • encryption scheme
  • chosen ciphertext
  • standard model
  • security analysis
  • chosen plaintext attack
  • database
  • databases
  • similarity measure
  • digital libraries
  • data management
  • ciphertext