References
- E. Andreeva, A. Bogdanov, Y. Dodis, B. Mennink and J. P. Steinberger, "On the Indifferentiability of Key-Alternating Ciphers", Proceedings of CRYPTO 2013, LNCS Vol. 8042, pp. 531-550, 2013.
- A. Biryukov, C. De Canniere, A. Braeken and B. Preneel, "A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms", Proceedings of EUROCRYPT 2003, LNCS Vol. 2656, pp. 33-50, 2003.
- A. Bogdanov, L. R. Knudsen, G. Leander, F. Standaert, J. Steinberger and E. Tischhauser, "Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations", Proceedings of EUROCRYPT 2012, LNCS Vol. 7237, pp. 45-62, 2012.
- A. Biryukov and D. Wagner, "Advanced Slide Attacks", Proceedings of EUROCRYPT 2000, LNCS Vol. 1807, pp. 589-606, 2000.
- S. Chen, R. Lampe, J. Lee, Y. Seurin and J. P. Steinberger, "Minimizing the tworound Even-Mansour cipher", Proceedings of CRYPTO 2014, LNCS Vol. 8616, pp. 39-56, 2014.
- S. Chen and J. P. Steinberger, "Tight Security Bounds for Key-Alternating Ciphers", Proceedings of EUROCRYPT 2014, LNCS Vol. 8441, pp. 327-350, 2014.
- J. Daemen, "Limitations of the Even-Mansour Construction", Proceedings of ASIACRYPT 1991, LNCS Vol. 739, pp. 495-498, 1993.
- I. Dinur, O. Dunkelman, N. Keller and A. Shamir, " Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2", Proceedings of ASIACRYPT 2013, LNCS Vol. 8269, pp. 337-356, 2013.
- I. Dinur, O. Dunkelman, N. Keller and A. Shamir, "Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys", Proceedings of ASIACRYPT 2014, LNCS Vol. 8873, pp. 439-457, 2014.
- O. Dunkelman, N. Keller and A. Shamir, "Minimalism in Cryptography: The Even-Mansour Scheme Revisited", Proceedings of EUROCRYPT 2012, LNCS Vol. 7237, pp. 336-354, 2012.
- Y. Dai, J. Lee, B. Mennink and J. P. Steinberger, "The Security of Multiple Encryption in the Ideal Cipher Model", Proceedings of CRYPTO 2014, LNCS Vol. 8616, pp. 20-38, 2014.
- S. Even and Y. Mansour, "A Construction of a Cipher From a Single Pseudorandom Permutation", Proceedings of ASIACRYPT 1991, LNCS Vol. 739, pp. 210-224, 1993.
- S. Even and Y. Mansour, "A Construction of a Cipher from a Single Pseudorandom Permutation", Journal of Cryptology 10(3), pp. 151-162, 1997. https://doi.org/10.1007/s001459900025
- P. Gazi and S. Tessaro, "Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading", Proceedings of EUROCRYPT 2012, LNCS Vol. 7237, pp. 63-80, 2012.
- H. Kim, "Simplification on Even-Mansour Scheme Attacks", Journal of Information and Security, Vol. 16, No. 7, pp. 85-91, 2016.
- S. Noh, "A Study of DES(Data Encryption Standard) Property, Diagnosis and How to Apply Enhanced Symmetric Key Encryption Algorithm", Journal of Information and Security, Vol. 12, No. 4, pp. 85-90, 2012.