Information-theoretic indistinguishability via the chi-squared method
From MaRDI portal
Publication:1675217
DOI10.1007/978-3-319-63697-9_17zbMath1418.94042OpenAlexW2729427879MaRDI QIDQ1675217
Stefano Tessaro, Viet Tung Hoang, Wei Dai
Publication date: 27 October 2017
Full work available at URL: https://doi.org/10.1007/978-3-319-63697-9_17
Related Items
Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method, Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds, Beyond-birthday security for permutation-based Feistel networks, \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations, Beyond-birthday secure domain-preserving PRFs from a single permutation, Tight security of cascaded LRW2, Proof of mirror theory for a wide range of \(\xi_{\max }\), Security of truncated permutation without initial value, Multi-user security of the sum of truncated random permutations, Improved multi-user security using the squared-ratio method, Quantum attacks against BBB secure PRFs or MACs built from public random permutations, Luby-Rackoff backwards with more users and more security, Categorization of faulty nonce misuse resistant message authentication, \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher, The Relation Between CENC and NEMO, Revisiting the indifferentiability of the sum of permutations, Beyond birthday bound secure fresh rekeying: application to authenticated encryption, How to build optimally secure PRFs using block ciphers, Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher, Targeted ciphers for format-preserving encryption, A note on the chi-square method: a tool for proving cryptographic security, Analysis of the single-permutation encrypted Davies-Meyer construction, Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model, Mind the composition: birthday bound attacks on EWCDMD and SoKAC21, The summation-truncation hybrid: reusing discarded bits for free, On the streaming indistinguishability of a random permutation and a random function, TNT: how to tweak a block cipher