. R. Adk-+-14.-martin, B. Albrecht, . Driessen, G. Elif-bilge-kavun, C. Leander et al., Block ciphers -focus on the linear layer (feat. PRIDE), CRYPTO 2014, Part I, vol.8616, pp.57-76, 2014.

, National Institute of Standards and Technology (NIST), FIPS PUB 197, 2001.

. J. Bcg-+-12, A. Borghoff, T. Canteaut, . Güneysu, M. Elif-bilge-kavun et al., PRINCE -A low-latency block cipher for pervasive computing applications -extended abstract, Heidelberg, vol.7658, pp.208-225, 2012.

J. Black and P. Rogaway, A block-cipher mode of operation for parallelizable message authentication, LNCS, vol.2332, pp.384-397, 2002.

R. Benoit-cogliati, Y. Lampe, and . Seurin, DES77. Data encryption standard, CRYPTO 2015, Part I, vol.9215, pp.189-208, 1977.

S. Even and Y. Mansour, A construction of a cipher from a single pseudorandom permutation, ASIACRYPT'91, vol.739, pp.210-224, 1993.

P. Ga?i, Plain versus randomized cascading-based key-length extension for block ciphers, CRYPTO 2013, Part I, vol.8042, pp.551-570, 2013.

. Jlm-+-17.-ashwin, E. Jha, K. List, S. Minematsu, M. Mishra et al., XHX -A framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing, Cryptology ePrint Archive, 1075.

J. Kilian and P. Rogaway, How to protect DES against exhaustive key search, CRYPTO'96, vol.1109, pp.252-267, 1996.

B. Lee and J. Lee, Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model, ASIACRYPT 2018, Part I, volume 11272 of LNCS, pp.305-335, 2018.

M. Liskov, R. L. Rivest, and D. Wagner, Tweakable blockciphers with beyond birthday-bound security, Journal of Cryptology, vol.24, issue.3, pp.14-30, 2011.

B. Mennink, Optimally secure tweakable blockciphers, LNCS, vol.9054, pp.428-448, 2015.

B. Mennink, XPX: Generalized tweakable Even-Mansour with improved security guarantees, CRYPTO 2016, Part I, vol.9814, pp.64-94, 2016.

B. Mennink, Insuperability of the standard versus ideal model gap for tweakable blockcipher security, Part, vol.II, pp.708-732, 2017.

B. Mennink, Towards tight security of cascaded LRW2, TCC 2018, Part II, vol.11240, pp.192-222, 2018.

K. Minematsu and T. Iwata, Tweak-length extension for tweakable blockciphers, 15th IMA International Conference on Cryptography and Coding, vol.9496, pp.77-93, 2015.

P. Rogaway, M. Bellare, J. Black, and T. Krovetz, Rog04. Phillip Rogaway. Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC, ACM CCS 2001, vol.3329, pp.16-31, 2001.