Information-theoretic indistinguishability via the chi-squared method
From MaRDI portal
Publication:1675217
DOI10.1007/978-3-319-63697-9_17zbMath1418.94042OpenAlexW2729427879MaRDI QIDQ1675217
Stefano Tessaro, Viet Tung Hoang, Wei Dai
Publication date: 27 October 2017
Full work available at URL: https://doi.org/10.1007/978-3-319-63697-9_17
Related Items (27)
Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method ⋮ Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds ⋮ Beyond-birthday security for permutation-based Feistel networks ⋮ \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations ⋮ Beyond-birthday secure domain-preserving PRFs from a single permutation ⋮ Tight security of cascaded LRW2 ⋮ Proof of mirror theory for a wide range of \(\xi_{\max }\) ⋮ Security of truncated permutation without initial value ⋮ Multi-user security of the sum of truncated random permutations ⋮ Improved multi-user security using the squared-ratio method ⋮ Quantum attacks against BBB secure PRFs or MACs built from public random permutations ⋮ Luby-Rackoff backwards with more users and more security ⋮ Categorization of faulty nonce misuse resistant message authentication ⋮ \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher ⋮ The Relation Between CENC and NEMO ⋮ Revisiting the indifferentiability of the sum of permutations ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ How to build optimally secure PRFs using block ciphers ⋮ Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher ⋮ Targeted ciphers for format-preserving encryption ⋮ A note on the chi-square method: a tool for proving cryptographic security ⋮ Analysis of the single-permutation encrypted Davies-Meyer construction ⋮ Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model ⋮ Mind the composition: birthday bound attacks on EWCDMD and SoKAC21 ⋮ The summation-truncation hybrid: reusing discarded bits for free ⋮ On the streaming indistinguishability of a random permutation and a random function ⋮ TNT: how to tweak a block cipher
This page was built for publication: Information-theoretic indistinguishability via the chi-squared method