Paper 2013/674
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
Itai Dinur, Orr Dunkelman, Nathan Keller, and Adi Shamir
Abstract
The iterated Even-Mansour (EM) scheme is a generalization of the original 1-round construction proposed in 1991, and can use one key, two keys, or completely independent keys. In this paper, we methodically analyze the security of all the possible iterated Even-Mansour schemes with two
Metadata
- Available format(s)
-
PDF
- Publication info
- A minor revision of an IACR publication in ASIACRYPT 2014
- Keywords
- Cryptanalysismeet-in-the-middle attacksmultibridge attackiterated Even-MansourLED-128.
- Contact author(s)
- dinur @ di ens fr
- History
- 2014-09-15: last of 4 revisions
- 2013-10-24: received
- See all versions
- Short URL
- https://ia.cr/2013/674
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2013/674, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys}, howpublished = {Cryptology {ePrint} Archive, Paper 2013/674}, year = {2013}, url = {https://eprint.iacr.org/2013/674} }