Related-key security for pseudorandom functions beyond the linear barrier
From MaRDI portal
Publication:1994635
DOI10.1007/s00145-017-9274-8zbMath1442.94029OpenAlexW160724103MaRDI QIDQ1994635
Alain Passelègue, Michel Abdalla, Fabrice Benhamouda, Kenneth G. Paterson
Publication date: 1 November 2018
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-017-9274-8
Related Items (2)
Witness authenticating NIZKs and applications ⋮ On the related-key attack security of authenticated encryption schemes
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Key Homomorphic PRFs and Their Applications
- An Algebraic Framework for Diffie-Hellman Assumptions
- Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
- New and Improved Key-Homomorphic Pseudorandom Functions
- Public Key Encryption against Related Key Attacks
- Correlated-Input Secure Hash Functions
- Cryptography Secure against Related-Key Attacks and Tampering
- Distinguisher and Related-Key Attack on the Full AES-256
- Fast Polynomial Factorization and Modular Composition
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- A Unified Approach to Related-Key Attacks
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
- Improved Constructions of PRFs Secure Against Related-Key Attacks
- Related-Key Boomerang and Rectangle Attacks
This page was built for publication: Related-key security for pseudorandom functions beyond the linear barrier