Главная
Study mode:
on
1
Introduction
2
Two Approaches
3
Fire on Key Cipher
4
Security of Block Ciphers
5
Indifferentiability
6
Indifferentiability Definition
7
Simulator
8
Prior Work
9
Proof
10
Naive Simulator
11
Distinguishing Strategy
12
Distinguishing Strategy Fix
13
Simulation
14
Partial Chain Detection
15
Preemptive Completion
16
HighLevel Strategy
17
Simulator Efficiency
18
HighLevel Overview
19
HighLevel Approach
20
Conclusion
Description:
Explore a cryptographic research presentation on the indifferentiability of iterated Even-Mansour ciphers with non-idealized key schedules. Delve into two approaches, the Fire on Key Cipher, and security aspects of block ciphers. Examine the concept of indifferentiability, its definition, and the role of simulators. Review prior work in the field before diving into the proof, which includes discussions on naive simulators, distinguishing strategies, and their fixes. Analyze simulation techniques, partial chain detection, and preemptive completion. Gain insights into the high-level strategy, simulator efficiency, and overall approach. Conclude with a summary of the key findings and implications for cryptographic research.

Indifferentiability of Iterated Even Mansour Ciphers with Non Idealized Key Schedules

TheIACR
Add to list