Block ciphers -focus on the linear layer (feat. PRIDE), CRYPTO 2014, Part I, vol.8616, pp.57-76, 2014. ,
, National Institute of Standards and Technology (NIST), FIPS PUB 197, 2001.
PRINCE -A low-latency block cipher for pervasive computing applications -extended abstract, Heidelberg, vol.7658, pp.208-225, 2012. ,
A block-cipher mode of operation for parallelizable message authentication, LNCS, vol.2332, pp.384-397, 2002. ,
DES77. Data encryption standard, CRYPTO 2015, Part I, vol.9215, pp.189-208, 1977. ,
A construction of a cipher from a single pseudorandom permutation, ASIACRYPT'91, vol.739, pp.210-224, 1993. ,
Plain versus randomized cascading-based key-length extension for block ciphers, CRYPTO 2013, Part I, vol.8042, pp.551-570, 2013. ,
XHX -A framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing, Cryptology ePrint Archive, 1075. ,
How to protect DES against exhaustive key search, CRYPTO'96, vol.1109, pp.252-267, 1996. ,
Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model, ASIACRYPT 2018, Part I, volume 11272 of LNCS, pp.305-335, 2018. ,
Tweakable blockciphers with beyond birthday-bound security, Journal of Cryptology, vol.24, issue.3, pp.14-30, 2011. ,
Optimally secure tweakable blockciphers, LNCS, vol.9054, pp.428-448, 2015. ,
XPX: Generalized tweakable Even-Mansour with improved security guarantees, CRYPTO 2016, Part I, vol.9814, pp.64-94, 2016. ,
Insuperability of the standard versus ideal model gap for tweakable blockcipher security, Part, vol.II, pp.708-732, 2017. ,
Towards tight security of cascaded LRW2, TCC 2018, Part II, vol.11240, pp.192-222, 2018. ,
Tweak-length extension for tweakable blockciphers, 15th IMA International Conference on Cryptography and Coding, vol.9496, pp.77-93, 2015. ,
Rog04. Phillip Rogaway. Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC, ACM CCS 2001, vol.3329, pp.16-31, 2001. ,