How to Construct Pseudorandom Permutations from Pseudorandom Functions

From MaRDI portal
Publication:3787920

DOI10.1137/0217022zbMath0644.94018OpenAlexW2077300005WikidataQ29398612 ScholiaQ29398612MaRDI QIDQ3787920

Michael Luby, Charles W. Rackoff

Publication date: 1988

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1137/0217022




Related Items

Subquadratic SNARGs in the random oracle modelHow to build an ideal cipher: the indifferentiability of the Feistel constructionRelated-key analysis of generalized Feistel networks with expanding round functionsComputational hardness of optimal fair computation: beyond MinicryptOptimum attack on 3-round Feistel-2 structureCryptography from Learning Parity with NoiseExtended meet-in-the-middle attacks on some Feistel constructionsA construction of the simplest super pseudorandom permutation generatorThe GGM Function Family Is a Weakly One-Way Family of FunctionsMore efficient DDH pseudorandom generatorsBloom Filters in Adversarial EnvironmentsOn Reverse-Engineering S-Boxes with Hidden Design Criteria or StructureNew Attacks on Feistel Structures with Improved Memory ComplexitiesSparse pseudorandom distributionsImproving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \(\chi^2\)-methodQuantum cryptanalysis on contracting Feistel structures and observation on related-key settingsFull indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) methodAnonymous IBE, leakage resilience and circular security from new assumptionsConstructing parallel long-message signcryption scheme from trapdoor permutationDerandomized constructions of \(k\)-wise (almost) independent permutationsA construction of a cipher from a single pseudorandom permutation.Mathematical problems in cryptologyBeyond-birthday security for permutation-based Feistel networksA study of password securityQuantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256Towards Understanding the Known-Key Security of Block CiphersAttacking BEAR and LION Schemes in a Realistic ScenarioUsing Bernstein-Vazirani algorithm to attack block ciphersPseudo-mixing Time of Random WalksHardness-preserving reductions via cuckoo hashingAuthenticated Encryption Mode for Beyond the Birthday Bound SecurityA Proof of Security in O(2 n ) for the Benes SchemeQuantum key-recovery attack on Feistel constructions: Bernstein-Vazirani meet Grover algorithmApplications of Simon's algorithm in quantum attacks on Feistel variantsOn Lai-Massey and quasi-Feistel ciphersPseudorandomness analysis of the (extended) Lai-Massey schemeTweakable enciphering schemes using only the encryption function of a block cipherOn the provable security of BEAR and LION schemesProbably Secure Keyed-Function Based Authenticated Encryption Schemes for Big DataRobust Multi-property Combiners for Hash Functions RevisitedTweakable block ciphersSquare reflection cryptanalysis of 5-round Feistel networks with permutationsRevisiting iterated attacks in the context of decorrelation theoryNon-cryptographic primitive for pseudorandom permutation.Being a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitivesAdaptive zero-knowledge proofs and adaptively secure oblivious transferCryptanalysis of Ladder-DESOn the security of remotely keyed encryptionAbout Feistel Schemes with Six (or More) RoundsMonkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYsRIV for Robust Authenticated EncryptionImproved Mixing Time Bounds for the Thorp ShuffleGeneric attacks with standard deviation analysis on a-Feistel schemesOn rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphersOn Integral Distinguishers of Rijndael Family of CiphersDeterministic encryption with the Thorp shuffleGeneric attacks on the Lai-Massey schemeOn the optimality of non-linear computations for symmetric key primitivesNotions and relations for RKA-secure permutation and function familiesA randomness test for block ciphersBuilding blockcipher from small-block tweakable blockcipherLuby-Rackoff revisited: on the use of permutations as inner functions of a Feistel schemeA general mixing strategy for the ECB-Mix-ECB mode of operationDistinguishing Distributions Using Chernoff InformationToward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman AssumptionA Provable-Security Treatment of the Key-Wrap ProblemEfficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman AssumptionHash Functions from Defective Ideal CiphersOn the XOR of Multiple Random PermutationsDistinguishing properties and applications of higher order derivatives of Boolean functionsPseudorandomness of Camellia-like schemeImplementing, and keeping in check, a DSL used in E-learningOnline Ciphers from Tweakable BlockciphersAnalysis of the single-permutation encrypted Davies-Meyer constructionCryptanalysis of Feistel Networks with Secret Round FunctionsRobust multi-property combiners for hash functionsVerifiable random functions: relations to identity-based key encapsulation and new constructionsVerifiable Random Functions from Identity-Based Key EncapsulationMind the composition: birthday bound attacks on EWCDMD and SoKAC21Three third generation attacks on the format preserving encryption scheme FF3An Almost m-wise Independent Random Permutation of the CubeProvable related-key security of contracting Feistel networksGeneric Attacks on Feistel Networks with Internal PermutationsDistinguishers for Ciphers and Known Key Attack against Rijndael with Large BlocksBuilding Secure Block Ciphers on Generic Attacks AssumptionsThe “Coefficients H” TechniqueBreaking Symmetric Cryptosystems Using Quantum Period FindingKeyed hash functionsBuilding Blockcipher from Tweakable Blockcipher: Extending FSE 2009 ProposalSecurity of Hash-then-CBC Key Wrapping RevisitedIndifferentiability of 8-Round Feistel NetworksA Domain Extender for the Ideal CipherTruly Efficient String Oblivious Transfer Using Resettable Tamper-Proof TokensSynthesizers and their application to the parallel construction of pseudo-random functionsQuantum statistical mechanics of encryption: reaching the speed limit of classical block ciphersThe summation-truncation hybrid: reusing discarded bits for freeBlack-box use of one-way functions is useless for optimal fair coin-tossingGuaranteeing the diversity of number generatorsQuantum generic attacks on key-alternating Feistel ciphers for shorter keysPseudorandom Functions: Three Decades LaterBreaking symmetric cryptosystems using the offline distributed Grover-Meets-Simon algorithmKeyed sum of permutations: a simpler RP-based PRFImpossibility of indifferentiable iterated blockciphers from 3 or less primitive callsPost-quantum security on the Lai-Massey schemeJammin' on the deckBBB security for 5-round even-Mansour-based key-alternating Feistel ciphersNoise-free thumbnail-preserving image encryption based on MSB predictionLuby-Rackoff backwards with more users and more securityProvable security of HADES structureQuantum attacks on Lai-Massey structureBet-or-pass: adversarially robust Bloom filters\texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applicationsGeneric Attacks on Unbalanced Feistel Schemes with Expanding FunctionsThe security of the cipher block chaining message authentication codeA New Structural-Differential Property of 5-Round AESPublic-Seed Pseudorandom PermutationsInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Obfustopia built on secret-key functional encryptionTweakable Enciphering Schemes from Hash-Sum-ExpansionTwo New Efficient CCA-Secure Online Ciphers: MHCBC and MCBCTweakable Pseudorandom Permutation from Generalized Feistel StructureFinding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsPrivate Information Retrieval Using Trusted HardwareQuantum-Secure Symmetric-Key Cryptography Based on Hidden ShiftsFeedback linearly extended discrete functions




This page was built for publication: How to Construct Pseudorandom Permutations from Pseudorandom Functions