The summation-truncation hybrid: reusing discarded bits for free
From MaRDI portal
Publication:2096483
Recommendations
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 1302860 (Why is no real title available?)
- scientific article; zbMATH DE number 1303128 (Why is no real title available?)
- scientific article; zbMATH DE number 1030978 (Why is no real title available?)
- scientific article; zbMATH DE number 1406792 (Why is no real title available?)
- scientific article; zbMATH DE number 4185033 (Why is no real title available?)
- A NOTE ON SAMPLING WITH AND WITHOUT REPLACEMENT
- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
- A Provable-Security Treatment of the Key-Wrap Problem
- A note on the chi-square method: a tool for proving cryptographic security
- Advances in cryptology -- CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20--24, 2017. Proceedings. Part II
- Advances in cryptology -- EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 -- June 1, 2006. Proceedings.
- Advances in cryptology -- EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 -- May 3, 2018. Proceedings. Part I
- Breaking and repairing GCM security proofs
- Distance between sampling with and without replacement
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
- Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- How many queries are needed to distinguish a truncated random permutation from a random function?
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- How to stretch random functions: The security of protected counter sums
- Information-theoretic indistinguishability via the chi-squared method
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- KLEIN: a new family of lightweight block ciphers
- LBlock: a lightweight block cipher
- Linking Stam's bounds with generalized truncation
- New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
- New hash functions and their use in authentication and set equality
- On fast and provably secure message authentication based on universal hashing
- Optimal forgeries against polynomial-based MACs and GCM
- PRESENT: An Ultra-Lightweight Block Cipher
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- Piccolo: An Ultra-Lightweight Blockcipher
- Progress in Cryptology - INDOCRYPT 2004
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds
- Stronger Security Bounds for Wegman-Carter-Shoup Authenticators
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- The sum of PRPs is a secure PRF
Cited in
(5)- Multi-user security of the sum of truncated random permutations
- Luby-Rackoff backwards with more users and more security
- Tight indistinguishability bounds for the XOR of independent random permutations by Fourier analysis
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations
- Linking Stam's bounds with generalized truncation
Describes a project that uses
Uses Software
This page was built for publication: The summation-truncation hybrid: reusing discarded bits for free
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2096483)