A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
From MaRDI portal
Publication:5502805
Recommendations
- On the XOR of multiple random permutations
- Generic attacks for the Xor of \(k\) random permutations
- The indistinguishability of the XOR of \(k\) permutations
- Indifferentiability beyond the birthday bound for the xor of two public random permutations
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method
Cites work
- scientific article; zbMATH DE number 3683884 (Why is no real title available?)
- scientific article; zbMATH DE number 1302860 (Why is no real title available?)
- scientific article; zbMATH DE number 1303128 (Why is no real title available?)
- scientific article; zbMATH DE number 2009979 (Why is no real title available?)
- scientific article; zbMATH DE number 862975 (Why is no real title available?)
- A Combinatorial Problem on Abelian Groups
- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
- Advances in Cryptology - CRYPTO 2003
- Foiling birthday attacks in length-doubling transformations
- Generic attacks for the Xor of \(k\) random permutations
- The sum of PRPs is a secure PRF
Cited in
(37)- XOR of PRPs in a quantum world
- Multi-user security of the sum of truncated random permutations
- Luby-Rackoff backwards with more users and more security
- Cryptanalysis of Round-Reduced $$\mathtt{LED}$$
- Improved multi-user security using the squared-ratio method
- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
- \textsf{LightMAC}: fork it and make it faster
- How to build fully secure tweakable blockciphers from classical blockciphers
- A note on the chi-square method: a tool for proving cryptographic security
- XPX: generalized tweakable Even-Mansour with improved security guarantees
- The Relation Between CENC and NEMO
- How to build optimally secure PRFs using block ciphers
- Quantum attacks on PRFs based on public random permutations
- XLS is not a strong pseudorandom permutation
- The “Coefficients H” Technique
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds
- Revisiting the indifferentiability of the sum of permutations
- The indistinguishability of the XOR of \(k\) permutations
- Beyond-birthday secure domain-preserving PRFs from a single permutation
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
- Analysis of the single-permutation encrypted Davies-Meyer construction
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Mind the composition: birthday bound attacks on EWCDMD and SoKAC21
- Mirror theory and cryptography
- Proof of mirror theory for a wide range of \(\xi_{\max }\)
- Low-memory attacks against two-round Even-Mansour using the 3-XOR problem
- Tight indistinguishability bounds for the XOR of independent random permutations by Fourier analysis
- scientific article; zbMATH DE number 7758304 (Why is no real title available?)
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- A Proof of Security in O(2 n ) for the Benes Scheme
- Indifferentiability beyond the birthday bound for the xor of two public random permutations
- On the XOR of multiple random permutations
- Random number generators based on permutations can pass the collision test
- Generic attacks for the Xor of \(k\) random permutations
- The summation-truncation hybrid: reusing discarded bits for free
This page was built for publication: A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5502805)