Related-key security for pseudorandom functions beyond the linear barrier
From MaRDI portal
Publication:1994635
Recommendations
- Related-key security for pseudorandom functions beyond the linear barrier
- Improved constructions of PRFs secure against related-key attacks
- Pseudorandom functions and permutations provably secure against related-key attacks
- Algebraic XOR-RKA-secure pseudorandom functions from post-zeroizing multilinear maps
- On related-secret pseudorandomness
Cites work
- scientific article; zbMATH DE number 1024009 (Why is no real title available?)
- scientific article; zbMATH DE number 2009976 (Why is no real title available?)
- scientific article; zbMATH DE number 1394311 (Why is no real title available?)
- A Unified Approach to Related-Key Attacks
- An algebraic framework for Diffie-Hellman assumptions
- Correlated-input secure hash functions
- Cryptography secure against related-key attacks and tampering
- Distinguisher and Related-Key Attack on the Full AES-256
- Fast polynomial factorization and modular composition
- Improved constructions of PRFs secure against related-key attacks
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
- Key homomorphic PRFs and their applications
- New and improved key-homomorphic pseudorandom functions
- Pseudorandom functions and permutations provably secure against related-key attacks
- Public Key Encryption against Related Key Attacks
- RKA security beyond the linear barrier: IBE, encryption and signatures
- Related-Key Boomerang and Rectangle Attacks
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- Related-key security for pseudorandom functions beyond the linear barrier
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
Cited in
(21)- Algebraic XOR-RKA-secure pseudorandom functions from post-zeroizing multilinear maps
- On related-secret pseudorandomness
- Efficient amplification of the security of weak pseudo-random function generators
- An algebraic framework for pseudorandom functions and applications to related-key security
- Continuous non-malleable key derivation and its application to related-key security
- Secure message authentication against related-key attack
- On the Security of Pseudorandomized Information-Theoretically Secure Schemes
- Related-key security for pseudorandom functions beyond the linear barrier
- Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security
- Related-key almost universal hash functions: definitions, constructions and applications
- Witness authenticating NIZKs and applications
- Cryptography secure against related-key attacks and tampering
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
- How to stretch random functions: The security of protected counter sums
- RKA secure PKE based on the DDH and HR assumptions
- Pseudorandom functions from LWE: RKA security and application
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
- On the related-key attack security of authenticated encryption schemes
- Pseudorandom functions and permutations provably secure against related-key attacks
- Security Against Related Randomness Attacks via Reconstructive Extractors
- Improved constructions of PRFs secure against related-key attacks
This page was built for publication: Related-key security for pseudorandom functions beyond the linear barrier
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1994635)