Related-key security for pseudorandom functions beyond the linear barrier
From MaRDI portal
Publication:2874497
DOI10.1007/978-3-662-44371-2_5zbMATH Open1343.94035OpenAlexW160724103MaRDI QIDQ2874497FDOQ2874497
Authors: Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson
Publication date: 7 August 2014
Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-44371-2_5
Recommendations
- Related-key security for pseudorandom functions beyond the linear barrier
- Improved constructions of PRFs secure against related-key attacks
- Pseudorandom functions and permutations provably secure against related-key attacks
- Algebraic XOR-RKA-secure pseudorandom functions from post-zeroizing multilinear maps
- Cryptography secure against related-key attacks and tampering
Cited In (27)
- Related-key analysis of generalized Feistel networks with expanding round functions
- On related-secret pseudorandomness
- Continuously non-malleable codes against bounded-depth tampering
- An algebraic framework for pseudorandom functions and applications to related-key security
- Efficient amplification of the security of weak pseudo-random function generators
- Proactive secret sharing with constant communication
- Continuous non-malleable key derivation and its application to related-key security
- On the Security of Pseudorandomized Information-Theoretically Secure Schemes
- Provable related-key security of contracting Feistel networks
- Related-key almost universal hash functions: definitions, constructions and applications
- Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security
- How to make the Cramer-Shoup cryptosystem secure against linear related-key attacks
- Cryptography secure against related-key attacks and tampering
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
- How to stretch random functions: The security of protected counter sums
- Functional encryption: deterministic to randomized functions from simple assumptions
- Related-key security for pseudorandom functions beyond the linear barrier
- Pseudorandom functions from LWE: RKA security and application
- On the related-key attack security of authenticated encryption schemes
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
- Pseudorandom functions and permutations provably secure against related-key attacks
- Practical verifiable random function with RKA security
- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
- Security Against Related Randomness Attacks via Reconstructive Extractors
- Improved constructions of PRFs secure against related-key attacks
- Non-malleable functions and their applications
- Algebraic XOR-RKA-secure pseudorandom functions from post-zeroizing multilinear maps
This page was built for publication: Related-key security for pseudorandom functions beyond the linear barrier
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2874497)