A Proof of Security in O(2 n ) for the Xor of Two Random Permutations

From MaRDI portal
Publication:5502805

DOI10.1007/978-3-540-85093-9_22zbMath1162.94397OpenAlexW1583969855MaRDI QIDQ5502805

Jacques Patarin

Publication date: 9 January 2009

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-85093-9_22




Related Items (27)

Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) methodRevisiting AES-GCM-SIV: multi-user security, faster key derivation, and better boundsMirror theory and cryptographyCryptanalysis of Round-Reduced $$\mathtt{LED}$$Beyond-birthday secure domain-preserving PRFs from a single permutationProof of mirror theory for a wide range of \(\xi_{\max }\)How to Build Fully Secure Tweakable Blockciphers from Classical BlockciphersMulti-user security of the sum of truncated random permutationsImproved multi-user security using the squared-ratio methodLuby-Rackoff backwards with more users and more securityThe Relation Between CENC and NEMOQuantum attacks on PRFs based on public random permutationsRevisiting the indifferentiability of the sum of permutationsBeyond birthday bound secure fresh rekeying: application to authenticated encryptionHow to build optimally secure PRFs using block ciphersA note on the chi-square method: a tool for proving cryptographic securityOn the XOR of Multiple Random PermutationsAnalysis of the single-permutation encrypted Davies-Meyer constructionTweaking a block cipher: multi-user beyond-birthday-bound security in the standard modelRandom number generators based on permutations can pass the collision testMind the composition: birthday bound attacks on EWCDMD and SoKAC21The “Coefficients H” TechniqueCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersXPX: Generalized Tweakable Even-Mansour with Improved Security GuaranteesEWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MACA Proof of Security in O(2 n ) for the Xor of Two Random PermutationsThe summation-truncation hybrid: reusing discarded bits for free




Cites Work




This page was built for publication: A Proof of Security in O(2 n ) for the Xor of Two Random Permutations