On the Indifferentiability of the Sponge Construction
From MaRDI portal
Publication:5458592
DOI10.1007/978-3-540-78967-3_11zbMATH Open1149.94304OpenAlexW1553650484MaRDI QIDQ5458592FDOQ5458592
Authors: Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
Publication date: 15 April 2008
Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_11
Recommendations
- Quantum indistinguishability of random sponges
- On the indifferentiability of Fugue and Luffa
- Security of truncated permutation without initial value
- How to build an ideal cipher: the indifferentiability of the Feistel construction
- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6
Cited In (only showing first 100 items - show all)
- The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC
- Signcryption schemes with insider security in an ideal permutation model
- ALE: AES-based lightweight authenticated encryption
- Optimal security for keyed hash functions: avoiding time-space tradeoffs for finding collisions
- Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives
- Quark: a lightweight hash
- On the resilience of Even-Mansour to invariant permutations
- Analysis of NORX: investigating differential and rotational properties
- \textsc{scope}: on the side channel vulnerability of releasing unverified plaintexts
- Sponge based CCA2 secure asymmetric encryption for arbitrary length message
- How to build an ideal cipher: the indifferentiability of the Feistel construction
- Towards Understanding the Known-Key Security of Block Ciphers
- Slide Attacks on a Class of Hash Functions
- Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff
- Classical proofs for the quantum collapsing property of classical hash functions
- XPX: generalized tweakable Even-Mansour with improved security guarantees
- Simpira v2: a family of efficient permutations using the AES round function
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- New bounds for keyed sponges with extendable output: independence between capacity and message length
- Linear structures: applications to cryptanalysis of round-reduced \textsc{Keccak}
- Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier
- LWDSA: light-weight digital signature algorithm for wireless sensor networks
- Building indifferentiable compression functions from the PGV compression functions
- A measure of dependence for cryptographic primitives relative to ideal functions
- Algebraic Attacks on Round-Reduced Keccak
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials
- Beyond conventional security in sponge-based authenticated encryption modes
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour
- Public-seed pseudorandom permutations
- Troika: a ternary cryptographic hash function
- Whirlwind: a new cryptographic hash function
- An analysis of the blockcipher-based hash functions from PGV
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method
- Indifferentiability of 8-Round Feistel Networks
- How to incorporate associated data in sponge-based authenticated encryption
- From Indifferentiability to Constructive Cryptography (and Back)
- The Oribatida v1.3 family of lightweight authenticated encryption schemes
- Security of the Poseidon hash function against non-binary differential and linear attacks
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
- Improved domain extender for the ideal cipher
- Compact privacy protocols from post-quantum and timed classical assumptions
- Preimage resistance of \(\mathsf{LP}mkr\) with \(r=m-1\)
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}
- Mind the composition: birthday bound attacks on EWCDMD and SoKAC21
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)
- Compactness of hashing modes and efficiency beyond Merkle tree
- Leakage resilient value comparison with application to message authentication
- Practical Analysis of Reduced-Round Keccak
- Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance
- A review of quantum and hybrid quantum/classical blockchain protocols
- On the XOR of multiple random permutations
- Algebraic key-recovery attacks on reduced-round Xoofff
- Open problems in hash function security
- Sponge-based pseudo-random number generators
- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
- New collision attacks on round-reduced Keccak
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions
- A robust and sponge-like PRNG with improved efficiency
- Hold your breath, PRIMATEs are lightweight
- New second preimage attacks on dithered hash functions with low memory complexity
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
- Indifferentiability of confusion-diffusion networks
- An observation on NORX, BLAKE2, and ChaCha
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- Static-memory-hard functions, and modeling the cost of space vs. time
- Generic security of the SAFE API and its applications
- The indifferentiability of the duplex and its practical applications
- Executing and proving over dirty ledgers
- Security of permutation-based compression function {\textsf{lp}}231
- Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques
- Cryptanalysis of Tweaked Versions of SMASH and Reparation
- The NIST SHA-3 Competition: A Perspective on the Final Year
- Optimizing a password hashing function with hardware-accelerated symmetric encryption
- On time-space lower bounds for finding short collisions in sponge hash functions
- Crooked indifferentiability of enveloped XOR revisited
- Panther: a sponge based lightweight authenticated encryption scheme
- Breaking \textsc{Panther}
- Algebraic-differential attacks on a family of arithmetization-oriented symmetric ciphers
- Exact security analysis of ASCON
- \textsf{ISAP+}: \textsf{ISAP} with fast authentication
- Towards compressed permutation oracles
- Bash-f: another LRX sponge function
- Sequential indifferentiability of confusion-diffusion networks
- \textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function
- \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications
- On the security of keyed hashing based on public permutations
- A sponge-based PRF with good multi-user security
- Differential analysis of the ternary hash function Troika
- Double-block-length hash function for minimum memory size
- Forgery Attacks on Round-Reduced ICEPOLE-128
- On the indifferentiability of Fugue and Luffa
- Designing full-rate \textsf{Sponge} based AEAD modes
- On the possibility of a backdoor in the Micali-Schnorr generator
- From Farfalle to \textsc{Megafono} via Ciminion: the PRF \textsc{Hydra} for MPC applications
- Generic attack on duplex-based AEAD modes using random function statistics
- Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls
- Generalized Feistel ciphers for efficient prime field masking
This page was built for publication: On the Indifferentiability of the Sponge Construction
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458592)