On the Indifferentiability of the Sponge Construction
From MaRDI portal
Publication:5458592
DOI10.1007/978-3-540-78967-3_11zbMath1149.94304OpenAlexW1553650484MaRDI QIDQ5458592
Joan Daemen, Gilles Van Assche, Guido Bertoni, Michaël Peeters
Publication date: 15 April 2008
Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_11
Related Items
How to build an ideal cipher: the indifferentiability of the Feistel construction ⋮ Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications ⋮ Compact Privacy Protocols from Post-quantum and Timed Classical Assumptions ⋮ On the resilience of Even-Mansour to invariant permutations ⋮ Algebraic key-recovery attacks on reduced-round Xoofff ⋮ Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier ⋮ Static-memory-hard functions, and modeling the cost of space vs. time ⋮ Classical proofs for the quantum collapsing property of classical hash functions ⋮ Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour ⋮ Quark: a lightweight hash ⋮ LWDSA: light-weight digital signature algorithm for wireless sensor networks ⋮ Optimizing Online Permutation-Based AE Schemes for Lightweight Applications ⋮ From Indifferentiability to Constructive Cryptography (and Back) ⋮ The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC ⋮ Whirlwind: a new cryptographic hash function ⋮ Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method ⋮ Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message ⋮ An analysis of the blockcipher-based hash functions from PGV ⋮ Analysis of NORX: Investigating Differential and Rotational Properties ⋮ Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials ⋮ Towards Understanding the Known-Key Security of Block Ciphers ⋮ ALE: AES-Based Lightweight Authenticated Encryption ⋮ Query-Complexity Amplification for Random Oracles ⋮ Open problems in hash function security ⋮ A measure of dependence for cryptographic primitives relative to ideal functions ⋮ A review of quantum and hybrid quantum/classical blockchain protocols ⋮ Improved domain extender for the ideal cipher ⋮ From Farfalle to \textsc{Megafono} via Ciminion: the PRF \textsc{Hydra} for MPC applications ⋮ Generic attack on duplex-based AEAD modes using random function statistics ⋮ Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls ⋮ Optimal security for keyed hash functions: avoiding time-space tradeoffs for finding collisions ⋮ Tight preimage resistance of the sponge construction ⋮ Simpira v2: A Family of Efficient Permutations Using the AES Round Function ⋮ MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity ⋮ Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ Security of truncated permutation without initial value ⋮ Double-block-length hash function for minimum memory size ⋮ Panther: a sponge based lightweight authenticated encryption scheme ⋮ Crooked indifferentiability of enveloped XOR revisited ⋮ Sequential indifferentiability of confusion-diffusion networks ⋮ Breaking \textsc{Panther} ⋮ Time-space tradeoffs for sponge hashing: attacks and limitations for short collisions ⋮ \textsf{ISAP+}: \textsf{ISAP} with fast authentication ⋮ Hold your breath, PRIMATEs are lightweight ⋮ New second preimage attacks on dithered hash functions with low memory complexity ⋮ A robust and sponge-like PRNG with improved efficiency ⋮ \textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function ⋮ \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications ⋮ On the security of keyed hashing based on public permutations ⋮ New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions ⋮ An algebraic attack on ciphers with low-degree round functions: application to full MiMC ⋮ Security of permutation-based compression function {\textsf{lp}}231 ⋮ Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes ⋮ Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff ⋮ New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length ⋮ Key Recovery Attack Against 2.5-Round $$\pi $$ -Cipher ⋮ On the Indifferentiability of Fugue and Luffa ⋮ The NIST SHA-3 Competition: A Perspective on the Final Year ⋮ sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives ⋮ Signcryption schemes with insider security in an ideal permutation model ⋮ Public-Seed Pseudorandom Permutations ⋮ An observation on NORX, BLAKE2, and ChaCha ⋮ Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers ⋮ Slide Attacks on a Class of Hash Functions ⋮ How to Incorporate Associated Data in Sponge-Based Authenticated Encryption ⋮ On the XOR of Multiple Random Permutations ⋮ Troika: a ternary cryptographic hash function ⋮ Building indifferentiable compression functions from the PGV compression functions ⋮ The Oribatida v1.3 family of lightweight authenticated encryption schemes ⋮ Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts ⋮ Forgery Attacks on Round-Reduced ICEPOLE-128 ⋮ Security of the Poseidon hash function against non-binary differential and linear attacks ⋮ \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing ⋮ Bash-f: вариант LRX хэш-функции типа «губка» ⋮ Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli} ⋮ Mind the composition: birthday bound attacks on EWCDMD and SoKAC21 ⋮ Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\) ⋮ Compactness of hashing modes and efficiency beyond Merkle tree ⋮ Leakage resilient value comparison with application to message authentication ⋮ Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance ⋮ Cryptanalysis of Tweaked Versions of SMASH and Reparation ⋮ Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques ⋮ Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n ⋮ Preimage resistance of \(\mathsf{LP}mkr\) with \(r=m-1\) ⋮ Beyond conventional security in sponge-based authenticated encryption modes ⋮ Practical Analysis of Reduced-Round Keccak ⋮ XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees ⋮ Indifferentiability of 8-Round Feistel Networks ⋮ Two Attacks on RadioGatún ⋮ Optimizing a password hashing function with hardware-accelerated symmetric encryption ⋮ Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems ⋮ New Collision Attacks on Round-Reduced Keccak