Leaky Random Oracle (Extended Abstract)
From MaRDI portal
Publication:5505472
DOI10.1007/978-3-540-88733-1_16zbMath1204.94079OpenAlexW1496192149MaRDI QIDQ5505472
Kazuki Yoneyama, Kazuo Ohta, Satoshi Miyagawa
Publication date: 27 January 2009
Published in: Provable Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-88733-1_16
Related Items (8)
Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour ⋮ Hardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSA ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ Sequential indifferentiability of confusion-diffusion networks ⋮ Revisiting the indifferentiability of the sum of permutations ⋮ Strengthening the Known-Key Security Notion for Block Ciphers ⋮ Salvaging Merkle-Damgård for Practical Applications ⋮ Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- The random oracle methodology, revisited
- Stronger Security of Authenticated Key Exchange
- Hash-and-Sign with Weak Hashing Made Secure
- Random Oracles and Auxiliary Input
- Secure integration of asymmetric and symmetric encryption schemes
- Advances in Cryptology – CRYPTO 2004
- Constructing an Ideal Hash Function from Weak Ideal Compression Functions
- Security of Digital Signature Schemes in Weakened Random Oracle Models
- Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes
- On the Generic Insecurity of the Full Domain Hash
This page was built for publication: Leaky Random Oracle (Extended Abstract)