Clever arbiters versus malicious adversaries. On the gap between known-input security and chosen-input security
From MaRDI portal
Publication:2803661
DOI10.1007/978-3-662-49301-4_31zbMATH Open1405.94089OpenAlexW2476117518MaRDI QIDQ2803661FDOQ2803661
Authors: Serge Vaudenay
Publication date: 2 May 2016
Published in: The New Codebreakers (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-49301-4_31
Recommendations
Cites Work
- Probability Inequalities for Sums of Bounded Random Variables
- A public key cryptosystem and a signature scheme based on discrete logarithms
- New directions in cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fast Software Encryption
- Nonmalleable Cryptography
- A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations
- Title not available (Why is that?)
- Pseudorandom functions and permutations provably secure against related-key attacks
- Title not available (Why is that?)
- On the (Im)Possibility of Key Dependent Encryption
- New types of cryptanalytic attacks using related keys
- On cipher-dependent related-key attacks in the ideal-cipher model
- Critique of the related-key attack concept
- Title not available (Why is that?)
- Obfuscation for Cryptographic Purposes
- A white-box DES implementation for DRM applications
- Title not available (Why is that?)
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- On related-secret pseudorandomness
- Composition Implies Adaptive Security in Minicrypt
Cited In (1)
This page was built for publication: Clever arbiters versus malicious adversaries. On the gap between known-input security and chosen-input security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2803661)