The summation-truncation hybrid: reusing discarded bits for free
From MaRDI portal
Publication:2096483
DOI10.1007/978-3-030-56784-2_7zbMATH Open1503.94030OpenAlexW3048662861MaRDI QIDQ2096483FDOQ2096483
Authors: Aldo Gunsing, Bart Mennink
Publication date: 9 November 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56784-2_7
Recommendations
Cites Work
- LBlock: a lightweight block cipher
- Piccolo: An Ultra-Lightweight Blockcipher
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- New hash functions and their use in authentication and set equality
- On fast and provably secure message authentication based on universal hashing
- Title not available (Why is that?)
- PRESENT: An Ultra-Lightweight Block Cipher
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Title not available (Why is that?)
- Progress in Cryptology - INDOCRYPT 2004
- Title not available (Why is that?)
- Breaking and repairing GCM security proofs
- A Provable-Security Treatment of the Key-Wrap Problem
- Title not available (Why is that?)
- Stronger Security Bounds for Wegman-Carter-Shoup Authenticators
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- KLEIN: a new family of lightweight block ciphers
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Optimal forgeries against polynomial-based MACs and GCM
- Title not available (Why is that?)
- Advances in cryptology -- EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 -- June 1, 2006. Proceedings.
- A NOTE ON SAMPLING WITH AND WITHOUT REPLACEMENT
- Distance between sampling with and without replacement
- How to stretch random functions: The security of protected counter sums
- Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory
- Advances in cryptology -- CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20--24, 2017. Proceedings. Part II
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds
- Information-theoretic indistinguishability via the chi-squared method
- How many queries are needed to distinguish a truncated random permutation from a random function?
- The sum of PRPs is a secure PRF
- New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
- Title not available (Why is that?)
- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
- Advances in cryptology -- EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 -- May 3, 2018. Proceedings. Part I
- A note on the chi-square method: a tool for proving cryptographic security
- Linking Stam's bounds with generalized truncation
Cited In (5)
- Luby-Rackoff backwards with more users and more security
- Tight indistinguishability bounds for the XOR of independent random permutations by Fourier analysis
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations
- Linking Stam's bounds with generalized truncation
- Multi-user security of the sum of truncated random permutations
Uses Software
This page was built for publication: The summation-truncation hybrid: reusing discarded bits for free
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2096483)