2018
DOI: 10.1007/978-3-030-03326-2_12
|View full text |Cite
|
Sign up to set email alerts
|

ZCZ – Achieving n-bit SPRP Security with a Minimal Number of Tweakable-Block-Cipher Calls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…Unlike their work, this paper considers a fixed input length that is determined by the block and tweak lengths of the underlying TBC. Related to the enciphering scheme using a TBC, Bhaumik et al [BLN18] Table 1: Summary of our results and other related block ciphers based only on a TBC. (n, t) in TBC denotes an n-bit TBC with t-bit tweaks.…”
Section: Related Workmentioning
confidence: 89%
See 1 more Smart Citation
“…Unlike their work, this paper considers a fixed input length that is determined by the block and tweak lengths of the underlying TBC. Related to the enciphering scheme using a TBC, Bhaumik et al [BLN18] Table 1: Summary of our results and other related block ciphers based only on a TBC. (n, t) in TBC denotes an n-bit TBC with t-bit tweaks.…”
Section: Related Workmentioning
confidence: 89%
“…The primal purpose is to construct a highly secure block cipher with the minimal number of TBC calls. Related to [BLN18], Dutta and Nandi [DN18] presented a construction of a tweakable enciphering scheme which also has BBB security. The work of [DN18] can be seen as a construction of a variable-input-length TBC from a fixed-input-length TBC.…”
Section: Constructionmentioning
confidence: 99%
“…Owing to their versatility, tweakable block ciphers have a broad range of applicability, most notably in authenticated encryption schemes [LRW11,Rog04,PS16], and message authentication codes [Nai15, IMPS17, CLS17, GLN19, CLL22]. Apart from these, TBCs have also been employed to achieve other symmetric-key security goals, e.g., [Min09,RZ11,JN18,BLN18].…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, comparison turns difficult for SPRPs using field multiplications (e.g.,[NR99]) or tweakable blockciphers (e.g.,[BLN18]). …”
mentioning
confidence: 99%