On related-secret pseudorandomness
From MaRDI portal
Publication:3408199
Recommendations
- Fast Software Encryption
- scientific article; zbMATH DE number 2009976
- Pseudorandom functions and permutations provably secure against related-key attacks
- Related-key security for pseudorandom functions beyond the linear barrier
- Related-key security for pseudorandom functions beyond the linear barrier
Cites work
- scientific article; zbMATH DE number 3960854 (Why is no real title available?)
- scientific article; zbMATH DE number 1107691 (Why is no real title available?)
- scientific article; zbMATH DE number 2009976 (Why is no real title available?)
- A Pseudorandom Generator from any One-way Function
- An Improved Robust Fuzzy Extractor
- Breaking RSA may not be equivalent to factoring
- Cryptography and Coding
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
- Distinguisher and Related-Key Attack on the Full AES-256
- Fast Software Encryption
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- New Related-Key Boomerang Attacks on AES
- New types of cryptanalytic attacks using related keys
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
- Related-Key Differential-Linear Attacks on Reduced AES-192
- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
Cited in
(17)- scientific article; zbMATH DE number 2009976 (Why is no real title available?)
- Subversion-resilient signatures: definitions, constructions and applications
- Secure message authentication against related-key attack
- The related-key analysis of Feistel constructions
- On the Security of Pseudorandomized Information-Theoretically Secure Schemes
- Clever arbiters versus malicious adversaries. On the gap between known-input security and chosen-input security
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Naor-Reingold goes public: the complexity of known-key security
- Related-key security for pseudorandom functions beyond the linear barrier
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
- Fast Software Encryption
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
- Pseudorandom functions and permutations provably secure against related-key attacks
- On cipher-dependent related-key attacks in the ideal-cipher model
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
- Non-malleable Codes with Split-State Refresh
- Non-malleable functions and their applications
This page was built for publication: On related-secret pseudorandomness
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3408199)