The “Coefficients H” Technique

From MaRDI portal
Publication:3644210

DOI10.1007/978-3-642-04159-4_21zbMath1256.94060OpenAlexW1498886746MaRDI QIDQ3644210

Jacques Patarin

Publication date: 3 November 2009

Published in: Selected Areas in Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-04159-4_21




Related Items (73)

On tight quantum security of HMAC and NMAC in the quantum random oracle modelThe key-dependent message security of key-alternating Feistel ciphersRevisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user settingOn the resilience of Even-Mansour to invariant permutations(Quantum) cryptanalysis of misty schemesNonce-misuse security of the SAEF authenticated encryption modeTowards tight security of cascaded LRW2Tweaking Even-Mansour CiphersMulti-key Security: The Even-Mansour Construction RevisitedThe Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBCTweak-Length Extension for Tweakable BlockciphersRandom oracles and non-uniformityFull indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) methodRevisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds\textsf{Light-OCB}: parallel lightweight authenticated cipher with full securityRevisiting structure graphs: applications to CBC-MAC and EMACBeyond-birthday security for permutation-based Feistel networksMirror theory and cryptographyFormat-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers\(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutationsBeyond-birthday secure domain-preserving PRFs from a single permutationKeyed sum of permutations: a simpler RP-based PRFMulti-user security bound for filter permutators in the random oracle modelProof of mirror theory for a wide range of \(\xi_{\max }\)Tight lower bounds and optimal constructions of anonymous broadcast encryption and authenticationSecret can be public: low-memory AEAD mode for high-order maskingBlock-cipher-based tree hashingAdaptively code-correlation robustness functions and its applications to private set intersectionKey-reduced variants of 3Kf9 with beyond-birthday-bound securityJammin' on the deckTowards tight security bounds for \textsf{OMAC, XCBC} and \textsf{TMAC}A modular approach to the security analysis of two-permutation constructionsImproved multi-user security using the squared-ratio methodBetter security-efficiency trade-offs in permutation-based two-party computationTight security for key-alternating ciphers with correlated sub-keysFine-tuning the ISO/IEC standard \textsf{LightMAC}Categorization of faulty nonce misuse resistant message authenticationRevisiting the security of \textsf{COMET} authenticated encryption scheme\textsf{tHyENA}: making \textsf{HyENA} even smallerOn the Efficiency of ZMAC-Type ModesProvable security of HADES structureProvably secure reflection ciphersDesigning tweakable enciphering schemes using public permutationsINT-RUP security of \textsf{SAEB} and \textsf{TinyJAMBU}Offset-based BBB-secure tweakable block-ciphers with updatable caches\textsf{ISAP+}: \textsf{ISAP} with fast authenticationProvable security against generic attacks on stream ciphersHalf-tree: halving the cost of tree expansion in COT and DPFOutput masking of tweakable Even-Mansour can be eliminated for message authentication codeA robust and sponge-like PRNG with improved efficiencyTowards closing the security gap of Tweak-aNd-Tweak (TNT)Minimizing the two-round tweakable Even-Mansour cipherTight security analysis of 3-round key-alternating cipher with a single permutationHow to build optimally secure PRFs using block ciphersJust tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipherTweaking key-alternating Feistel block ciphersImproved indifferentiability security proof for 3-round tweakable Luby-RackoffNew Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message LengthA note on the chi-square method: a tool for proving cryptographic securityMinimizing the two-round Even-Mansour cipherThe Multi-user Security of Double EncryptionOn the XOR of Multiple Random PermutationsThe Oribatida v1.3 family of lightweight authenticated encryption schemesAnalysis of the single-permutation encrypted Davies-Meyer constructionTweaking a block cipher: multi-user beyond-birthday-bound security in the standard modelCompactness of hashing modes and efficiency beyond Merkle treeProvable related-key security of contracting Feistel networksKey-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user SecurityCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersEWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MACMulti-user BBB security of public permutations based MACSecurity analysis of NIST CTR-DRBGBetter concrete security for half-gates garbling (in the multi-instance setting)



Cites Work


This page was built for publication: The “Coefficients H” Technique