Length-doubling ciphers and tweakable ciphers

3Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.

Abstract

We motivate and describe a mode of operation HEM (resp., THEM) that turns a n-bit blockcipher into a variable-input-length cipher (resp., tweakable cipher) that acts on strings of [n..2n - 1] bits. Both HEM and THEM are simple and intuitive and use only two blockcipher calls, while prior work at least takes three. We prove them secure in the sense of strong PRP and tweakable strong PRP, assuming the underlying blockcipher is a strong PRP. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Zhang, H. (2012). Length-doubling ciphers and tweakable ciphers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7341 LNCS, pp. 100–116). https://doi.org/10.1007/978-3-642-31284-7_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free