Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method (Q1648806): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: On the Indifferentiability of the Grøstl Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Indifferentiability of the Sponge Construction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249643 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Analysis of the Mode of JH Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Indistinguishability of the XOR of $$k$$ Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elements of Information Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information-theoretic indistinguishability via the chi-squared method / rank
 
Normal rank
Property / cites work
 
Property / cites work: The advantage of truncated permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: How many queries are needed to distinguish a truncated random permutation from a random function? / rank
 
Normal rank
Property / cites work
 
Property / cites work: ZMAC: a fast tweakable block cipher mode for highly secure message authentication / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Blockcipher Modes of Operation with Beyond the Birthday Bound Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20--24, 2017. Proceedings. Part I / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indifferentiability of the Sum of Random Permutations Toward Optimal Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Construct Pseudorandom Permutations from Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374930 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3803964 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the XOR of Multiple Random Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: The “Coefficients H” Technique / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Proof of Security in O(2 n ) for the Xor of Two Random Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distance between sampling with and without replacement / rank
 
Normal rank
Property / cites work
 
Property / cites work: Decorrelation: a theory for block cipher security / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Variant of PMAC: Beyond the Birthday Bound / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two-Server Password-Only Authenticated Key Exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: HMQV: A High-Performance Secure Diffie-Hellman Protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409131 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Communications over Insecure Channels Based on Short Authenticated Strings / rank
 
Normal rank

Latest revision as of 01:51, 16 July 2024

scientific article
Language Label Description Also known as
English
Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method
scientific article

    Statements

    Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method (English)
    0 references
    0 references
    0 references
    9 July 2018
    0 references
    random permutation
    0 references
    indifferentiable security
    0 references
    \(\chi^2\) method
    0 references
    XOR construction
    0 references
    simulator
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers