On Related-Secret Pseudorandomness
From MaRDI portal
Publication:3408199
DOI10.1007/978-3-642-11799-2_16zbMath1274.94070OpenAlexW1758603164MaRDI QIDQ3408199
David Goldenberg, Moses Liskov
Publication date: 24 February 2010
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-11799-2_16
Related Items
Non-malleable functions and their applications, Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience, On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model, Subversion-resilient signatures: definitions, constructions and applications, Non-malleable Codes with Split-State Refresh, Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?, Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?, Clever Arbiters Versus Malicious Adversaries, Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- New types of cryptanalytic attacks using related keys
- Distinguisher and Related-Key Attack on the Full AES-256
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- An Improved Robust Fuzzy Extractor
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Breaking RSA may not be equivalent to factoring
- A Pseudorandom Generator from any One-way Function
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
- Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
- Related-Key Differential-Linear Attacks on Reduced AES-192
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- New Related-Key Boomerang Attacks on AES
- Fast Software Encryption
- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
- Cryptography and Coding