The following pages link to Theory of Cryptography (Q5901763):
Displayed 50 items.
- How to build an ideal cipher: the indifferentiability of the Feistel construction (Q271585) (← links)
- Improved indifferentiability security bound for the JH mode (Q285241) (← links)
- Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier (Q293718) (← links)
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour (Q306057) (← links)
- A simple variant of the Merkle-Damgård scheme with a permutation (Q431787) (← links)
- Improved elliptic curve hashing and point representation (Q510463) (← links)
- Optimal collision security in double block length hashing with single length key (Q522211) (← links)
- An analysis of the blockcipher-based hash functions from PGV (Q604636) (← links)
- Robust multi-property combiners for hash functions (Q744343) (← links)
- Open problems in hash function security (Q887443) (← links)
- A measure of dependence for cryptographic primitives relative to ideal functions (Q888120) (← links)
- Improved domain extender for the ideal cipher (Q892511) (← links)
- A synthetic indifferentiability analysis of some block-cipher-based hash functions (Q1009050) (← links)
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method (Q1648806) (← links)
- Pseudorandomness analysis of the (extended) Lai-Massey scheme (Q1944043) (← links)
- Simple hash function using discrete-time quantum walks (Q1993832) (← links)
- Obfuscation for cryptographic purposes (Q2267356) (← links)
- Beyond-birthday secure domain-preserving PRFs from a single permutation (Q2416937) (← links)
- On the XOR of Multiple Random Permutations (Q2794522) (← links)
- A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation (Q2827742) (← links)
- Indifferentiability of 8-Round Feistel Networks (Q2835584) (← links)
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications (Q2889879) (← links)
- Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles (Q2889880) (← links)
- Towards Understanding the Known-Key Security of Block Ciphers (Q2946886) (← links)
- Query-Complexity Amplification for Random Oracles (Q2947529) (← links)
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function (Q2958116) (← links)
- On the Indifferentiability of Fugue and Luffa (Q3011314) (← links)
- On the Security of Hash Functions Employing Blockcipher Postprocessing (Q3013082) (← links)
- On chosen target forced prefix preimage resistance (Q3075866) (← links)
- Security Analysis of SIMD (Q3084266) (← links)
- Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model (Q3092365) (← links)
- From Indifferentiability to Constructive Cryptography (and Back) (Q3179350) (← links)
- A Domain Extender for the Ideal Cipher (Q3408200) (← links)
- Asynchronous Multi-Party Computation with Quadratic Communication (Q3519524) (← links)
- On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak (Q3519537) (← links)
- Robust Multi-property Combiners for Hash Functions Revisited (Q3519540) (← links)
- A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier (Q3627438) (← links)
- Salvaging Merkle-Damgård for Practical Applications (Q3627446) (← links)
- Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders (Q3634491) (← links)
- On the Weak Ideal Compression Functions (Q3634496) (← links)
- A Scheme to Base a Hash Function on a Block Cipher (Q3644205) (← links)
- RIV for Robust Authenticated Encryption (Q4639469) (← links)
- Modeling Random Oracles Under Unpredictable Queries (Q4639493) (← links)
- Strengthening the Known-Key Security Notion for Block Ciphers (Q4639495) (← links)
- Indifferentiable deterministic hashing to elliptic and hyperelliptic curves (Q4911913) (← links)
- How to Build a Hash Function from Any Collision-Resistant Function (Q5387097) (← links)
- Multi-property Preserving Combiners for Hash Functions (Q5445516) (← links)
- Extended Multi-Property-Preserving and ECM-Construction (Q5458224) (← links)
- Public-Seed Pseudorandom Permutations (Q5738982) (← links)
- Building indifferentiable compression functions from the PGV compression functions (Q5963372) (← links)