{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T02:37:08Z","timestamp":1747190228304,"version":"3.40.5"},"reference-count":22,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T00:00:00Z","timestamp":1583798400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Research Fund of International Young Scientists","award":["61902195","19KJB520045","NY219131"],"award-info":[{"award-number":["61902195","19KJB520045","NY219131"]}]},{"name":"Natural Science Fund for Colleges and Universities in Jiangsu Province","award":["61902195","19KJB520045","NY219131"],"award-info":[{"award-number":["61902195","19KJB520045","NY219131"]}]},{"name":"NUPTSF","award":["61902195","19KJB520045","NY219131"],"award-info":[{"award-number":["61902195","19KJB520045","NY219131"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,3,10]]},"abstract":"<jats:p>The Even\u2013Mansour cipher has been widely used in block ciphers and lightweight symmetric-key ciphers because of its simple structure and strict provable security. Its research has been a hot topic in cryptography. This paper focuses on the problem to minimize the key material of the Even\u2013Mansour cipher while its security bound remains essentially the same. We introduce four structures of the Even\u2013Mansour cipher with a short key and derive their security by Patarin\u2019s H-coefficients technique. These four structures are proven secure up to <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\"><mml:mrow><mml:mrow><mml:mover accent=\"true\"><mml:mi>O<\/mml:mi><mml:mo>\u02dc<\/mml:mo><\/mml:mover><\/mml:mrow><mml:mfenced open=\"(\" close=\")\" separators=\"|\"><mml:mrow><mml:msup><mml:mrow><mml:mn>2<\/mml:mn><\/mml:mrow><mml:mrow><mml:mi>k<\/mml:mi><\/mml:mrow><\/mml:msup><mml:mo>\/<\/mml:mo><mml:mi>\u03bc<\/mml:mi><\/mml:mrow><\/mml:mfenced><\/mml:mrow><\/mml:math> adversarial queries, where <jats:italic>k<\/jats:italic> is the bit length of the key material and <jats:italic>\u03bc<\/jats:italic> is the maximal multiplicity. Then, we apply them to lightweight authenticated encryption modes and prove their security up to about <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M2\"><mml:mrow><mml:mtext>min<\/mml:mtext><mml:mfenced open=\"{\" close=\"}\" separators=\"|\"><mml:mrow><mml:mi>b<\/mml:mi><mml:mo>\/<\/mml:mo><mml:mn>2<\/mml:mn><mml:mo>,<\/mml:mo><mml:mi>c<\/mml:mi><mml:mo>,<\/mml:mo><mml:mi>k<\/mml:mi><mml:mo>\u2212<\/mml:mo><mml:mtext>log\u2009<\/mml:mtext><mml:mi>\u03bc<\/mml:mi><\/mml:mrow><\/mml:mfenced><\/mml:mrow><\/mml:math>-bit adversarial queries, where <jats:italic>b<\/jats:italic> is the size of the permutation and <jats:italic>c<\/jats:italic> is the capacity of the permutation. Finally, we leave it as an open problem to settle the security of the <jats:italic>t<\/jats:italic>-round iterated Even\u2013Mansour cipher with short keys.<\/jats:p>","DOI":"10.1155\/2020\/4180139","type":"journal-article","created":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T19:36:19Z","timestamp":1583868979000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Minimizing Key Materials: The Even\u2013Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0647-0375","authenticated-orcid":true,"given":"Ping","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China"}]},{"given":"Qian","family":"Yuan","sequence":"additional","affiliation":[{"name":"School of Economics and Management, Southeast University, Nanjing 211189, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_29"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_5"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-018-9295-y"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_19"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_23"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48116-5_17"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.e102.a.27"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.e102.a.17"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_18"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900025"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_21"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_9"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_10"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52153-4_17"},{"issue":"2","key":"16","first-page":"84","volume":"2017","year":"2017","journal-title":"The IACR Transactions on Symmetric Cryptology"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-018-1886-4"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_3"},{"key":"19","first-page":"328","volume-title":"The \u201ccoefficients H\u201d technique","volume":"5381","year":"2008"},{"issue":"2","key":"20","first-page":"218","volume":"2018","year":"2018","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2016.1209259"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.e102.a.35"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_25"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/4180139.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/4180139.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/4180139.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T19:36:26Z","timestamp":1583868986000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/4180139\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,10]]},"references-count":22,"alternative-id":["4180139","4180139"],"URL":"https:\/\/doi.org\/10.1155\/2020\/4180139","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2020,3,10]]}}}