Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes

Zhelei Sun, Peng Wang, Liting Zhang. Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes. In Ernest Foo, Douglas Stebila, editors, Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings. Volume 9144 of Lecture Notes in Computer Science, pages 3-19, Springer, 2015. [doi]

@inproceedings{SunWZ15-0,
  title = {Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes},
  author = {Zhelei Sun and Peng Wang and Liting Zhang},
  year = {2015},
  doi = {10.1007/978-3-319-19962-7_1},
  url = {http://dx.doi.org/10.1007/978-3-319-19962-7_1},
  researchr = {https://researchr.org/publication/SunWZ15-0},
  cites = {0},
  citedby = {0},
  pages = {3-19},
  booktitle = {Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  editor = {Ernest Foo and Douglas Stebila},
  volume = {9144},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-319-19961-0},
}