Tweakable Block Ciphers
Citations
1,652 citations
1,311 citations
498 citations
Additional excerpts
...ifying permissible sequences of system calls [18, 48]....
[...]
377 citations
344 citations
References
13,597 citations
"Tweakable Block Ciphers" refers background or methods in this paper
...To make a hash function, one can adapt the Matyas-Meyer-Oseas construction (see Menezes et al. [ 11, Section 9.40 ])....
[...]
...EvenandMansour[ 8 ]havealsoinvestigatedasimilarconstructionwherethe...
[...]
...(see Menezes et al. [ 11, Section 9.40 ]) have fallen into disfavor because they have a feedback path into the key input of the block cipher....
[...]
979 citations
728 citations
649 citations
"Tweakable Block Ciphers" refers background or methods in this paper
...Similarly, if one looks at the internals of the recently proposed “offset codebook mode” (OCB mode) of Rogaway et al. [ 12 ], one sees DESX-like modules that may also be viewed as instances of a tweakable block ciphers....
[...]
...See, for example, the discussion by Rogaway et al. [ 12 ] explaining the design rationale for the OCB mode of operation, which uses the same cryptographic key throughout....
[...]
...This mode can be viewed as a paraphrase or restatement of the architecture of the OCB (offset codebook) mode proposed by Rogaway et al. [ 12 ] to utilize tweakable block ciphers rather than DESX-like modules....
[...]
529 citations
"Tweakable Block Ciphers" refers background in this paper
...need not yield secure tweakable block ciphers, since a block cipher need not dependoneverybitofitskey.(Biham’srelated-keyattacksofBiham[ 3 ]would be relevant to this sort of design.)...
[...]