Adventures in crypto dark matter: attacks and fixes for weak pseudorandom functions
From MaRDI portal
Publication:2061985
DOI10.1007/978-3-030-75248-4_26zbMATH Open1479.94144OpenAlexW3165509415MaRDI QIDQ2061985FDOQ2061985
Jung Hee Cheon, Jiseung Kim, Jeong Han Kim, Wonhee Cho
Publication date: 21 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-75248-4_26
Recommendations
- Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions
- Weak Pseudorandom Functions in Minicrypt
- Candidate weak pseudorandom functions in \(\mathrm{AC}^0\circ\mathrm{MOD}_2\)
- Low-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2]\)
- Exploring crypto dark matter: new simple PRF candidates and their applications
Cites Work
- On solving LPN using BKW and variants, Implementation and analysis
- Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
- On the bit security of cryptographic primitives
- A Leakage-Resilient Mode of Operation
- Keying Hash Functions for Message Authentication
- Title not available (Why is that?)
- Message Authentication, Revisited
- Title not available (Why is that?)
- Noise-tolerant learning, the parity problem, and the statistical query model
- Message Authentication Codes from Unpredictable Block Ciphers
- GGH15 beyond permutation branching programs: proofs, attacks, and candidates
- New proofs for NMAC and HMAC: security without collision resistance
- Pseudorandom Functions: Three Decades Later
- Title not available (Why is that?)
- Exploring crypto dark matter: new simple PRF candidates and their applications
- Bootstrapping Obfuscators via Fast Pseudorandom Functions
- Candidate weak pseudorandom functions in AC 0 ○ MOD 2
- From Selective to Adaptive Security in Functional Encryption
- Matrix PRFs: constructions, attacks, and applications to obfuscation
- A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security
Cited In (9)
- MPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applications
- Weak Pseudorandom Functions in Minicrypt
- Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions
- Crypto dark matter on the torus. Oblivious PRFs from shallow PRFs and TFHE
- Fast public-key silent OT and more from constrained Naor-Reingold
- Improved alternating-moduli PRFs and post-quantum signatures
- Malware, encryption, and rerandomization -- everything Is under attack
- Direct computation of branching programs and its applications to more efficient lattice-based cryptography
- Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography
This page was built for publication: Adventures in crypto dark matter: attacks and fixes for weak pseudorandom functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2061985)