Information-theoretic indistinguishability via the chi-squared method

From MaRDI portal
Revision as of 05:00, 1 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1675217

DOI10.1007/978-3-319-63697-9_17zbMath1418.94042OpenAlexW2729427879MaRDI QIDQ1675217

Stefano Tessaro, Viet Tung Hoang, Wei Dai

Publication date: 27 October 2017

Full work available at URL: https://doi.org/10.1007/978-3-319-63697-9_17




Related Items (27)

Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) methodRevisiting AES-GCM-SIV: multi-user security, faster key derivation, and better boundsBeyond-birthday security for permutation-based Feistel networks\(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutationsBeyond-birthday secure domain-preserving PRFs from a single permutationTight security of cascaded LRW2Proof of mirror theory for a wide range of \(\xi_{\max }\)Security of truncated permutation without initial valueMulti-user security of the sum of truncated random permutationsImproved multi-user security using the squared-ratio methodQuantum attacks against BBB secure PRFs or MACs built from public random permutationsLuby-Rackoff backwards with more users and more securityCategorization of faulty nonce misuse resistant message authentication\textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipherThe Relation Between CENC and NEMORevisiting the indifferentiability of the sum of permutationsBeyond birthday bound secure fresh rekeying: application to authenticated encryptionHow to build optimally secure PRFs using block ciphersJust tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipherTargeted ciphers for format-preserving encryptionA note on the chi-square method: a tool for proving cryptographic securityAnalysis of the single-permutation encrypted Davies-Meyer constructionTweaking a block cipher: multi-user beyond-birthday-bound security in the standard modelMind the composition: birthday bound attacks on EWCDMD and SoKAC21The summation-truncation hybrid: reusing discarded bits for freeOn the streaming indistinguishability of a random permutation and a random functionTNT: how to tweak a block cipher







This page was built for publication: Information-theoretic indistinguishability via the chi-squared method