There is no abstract available for this article.
This work was supported by National Natural Science Foundation of China (Grant Nos. 61522210, 61632013).
Appendixes A–C.
[1] Cogliati B, Lampe R, Seurin Y. Tweaking Even-Mansour ciphers. In: Proceedings of the 35th Annual Cryptology Conference, Santa Barbara, 2015. 189--208. Google Scholar
[2] Guo Z Y, Wu W L, Liu R, et al. Multi-key analysis of tweakable Even-Mansour with applications to Minalpher and OPP. IACR Trans Symmetric Cryptol, 2017, 2016: 288--306. Google Scholar
[3] Hoang V T, Tessaro S. Key-alternating ciphers and key-length extension: exact bounds and multi-user security. In: Proceedings of the 36th Annual International Cryptology Conference, Santa Barbara, 2016. Google Scholar
Figure 1
(Color online) Comparison of various security. From left to right: the naive bound of TEM-1 by using the hybrid argument, the bound of TEM-1 by point-wise proximity, the bound of TEM-1 that we derive in Theorem