Cryptology ePrint Archive: Report 2013/674
Available versions in chronological order
20131024:084359 (posted 24-Oct-2013 08:43:59 UTC)
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
Eli Biham and Yaniv Carmeli and Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
20140908:144806 (posted 08-Sep-2014 14:48:06 UTC)
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
Itai Dinur, Orr Dunkelman, Nathan Keller, and Adi Shamir
Original publication (with minor differences): IACR-ASIACRYPT-2014
20140908:150232 (posted 08-Sep-2014 15:02:32 UTC)
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
Itai Dinur, Orr Dunkelman, Nathan Keller, and Adi Shamir
Original publication (with minor differences): IACR-ASIACRYPT-2014
20140908:190604 (posted 08-Sep-2014 19:06:04 UTC)
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
Original publication (with minor differences): IACR-ASIACRYPT-2014
20140915:175324 (posted 15-Sep-2014 17:53:24 UTC)
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
Original publication (with minor differences): IACR-ASIACRYPT-2014
[
Cryptology ePrint archive
]