On the Indifferentiability of Key-Alternating Ciphers, Advances in Cryptology -CRYPTO 2013 (Proceedings, Part I), vol.8042, pp.531-550, 2013. ,
Towards Understanding the Known-Key Security of Block Ciphers, Fast Software Encryption -FSE 2013, vol.8424, pp.348-366, 2013. ,
Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks, Advances in Cryptology -CRYPTO 2010, vol.6223, pp.666-684, 2010. ,
Related-Key Boomerang and Rectangle Attacks, Advances in Cryptology -EUROCRYPT 2005, vol.3494, pp.507-525, 2005. ,
A Theoretical Treatment of Related-Key Attacks: RKAPRPs, RKA-PRFs, and Applications, Advances in Cryptology -EURO-CRYPT 2003, vol.2656, pp.491-506, 2003. ,
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations -(Extended Abstract), Advances in Cryptology -EUROCRYPT 2012, vol.7237, pp.45-62, 2012. ,
Distinguisher and Related-Key Attack on the Full AES-256, Advances in Cryptology -CRYPTO 2009, vol.5677, pp.231-249, 2009. ,
Black-Box Analysis of the Block-CipherBased Hash-Function Constructions from PGV, Advances in Cryptology -CRYPTO 2002, vol.2442, pp.320-335, 2002. ,
The Random Oracle Methodology, Revisited (Preliminary Version), Symposium on Theory of Computing -STOC '98, pp.209-218 ,
Minimizing the Two-Round Even-Mansour Cipher, Advances in Cryptology -CRYPTO 2014 (Proceedings, Part I), vol.8616, pp.39-56, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-02176881
Tight Security Bounds for Key-Alternating Ciphers, Advances in Cryptology -EUROCRYPT 2014, vol.8441, pp.327-350, 2014. ,
Limitations of the Even-Mansour Construction, Advances in Cryptology -ASIACRYPT '91, vol.739, pp.495-498, 1991. ,
Minimalism in Cryptography: The EvenMansour Scheme Revisited, Advances in Cryptology -EUROCRYPT 2012, vol.7237, pp.336-354, 2012. ,
Salvaging Merkle-Damgård for Practical Applications, Advances in Cryptology -EUROCRYPT 2009, vol.5479, pp.371-388, 2009. ,
A Construction of a Cipher from a Single Pseudorandom Permutation, Journal of Cryptology, vol.10, issue.3, pp.151-162, 1997. ,
The Related-Key Security of Iterated Even-Mansour Ciphers, Fast Software Encryption -FSE 2015, 2015. ,
On Related-Secret Pseudorandomness, Theory of Cryptography -TCC 2010, vol.5978, pp.255-272, 2010. ,
The Equivalence of the Random Oracle Model and the Ideal Cipher Model, Revisited, Symposium on Theory of Computing -STOC 2011, pp.89-98, 2011. ,
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms, Fast Software Encryption -FSE, vol.3017, pp.427-445, 2004. ,
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework, Advances in Cryptology -ASIACRYPT 2014 -Proceedings, Part II, vol.8874, pp.274-288, 2014. ,
Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions, Advances in Cryptology -CRYPTO 2013 (Proceedings, Part I), vol.8042, pp.571-588, 2013. ,
Known-Key Distinguishers for Some Block Ciphers, Advances in Cryptology -ASIACRYPT 2007, vol.4833, pp.315-324, 2007. ,
An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher, Advances in Cryptology -ASIACRYPT 2012, vol.7658, pp.278-295, 2012. ,
Tweakable Block Ciphers, Advances in Cryptology -CRYPTO 2002, vol.2442, pp.31-46, 2002. ,
How to Construct an Ideal Cipher from a Small Set of Public Permutations, Advances in Cryptology -ASIACRYPT 2013 (Proceedings, Part I), vol.8269, pp.444-463, 2013. ,
Ciphers Secure against Related-Key Attacks, Fast Software Encryption -FSE, vol.3017, pp.359-370, 2004. ,
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction, Theory of Cryptography Conference -TCC 2012, vol.7194, pp.285-302, 2012. ,
Impossibility Results on Reductions, and Applications to the Random Oracle Methodology, Theory of Cryptography Conference-TCC, vol.2951, pp.21-39, 2004. ,
Provable Security Against Differential Cryptanalysis, Advances in Cryptology -CRYPTO '92, vol.740, pp.566-574, 1992. ,
The "Coefficients H" Technique, Selected Areas in Cryptography -SAC, vol.5381, pp.328-345, 2008. ,
Formalizing Human Ignorance, Progress in Cryptology -VIETCRYPT, vol.4341, pp.211-228, 2006. ,
Careful with Composition: Limitations of the Indifferentiability Framework, Advances in Cryptology -EUROCRYPT 2011, vol.6632, pp.487-506, 2011. ,
Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance. IACR Cryptology ePrint Archive, 2012. ,
A Secure One-Way Hash Function Built from DES, IEEE Symposium on Security and Privacy, pp.88-90, 1984. ,
, Leaky Random Oracle. IEICE Transactions, issue.8, pp.1795-1807, 2009.