Multi-user security of the sum of truncated random permutations
From MaRDI portal
Publication:6132432
Recommendations
Cites work
- scientific article; zbMATH DE number 1302860 (Why is no real title available?)
- scientific article; zbMATH DE number 1303128 (Why is no real title available?)
- scientific article; zbMATH DE number 1406792 (Why is no real title available?)
- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
- Analysis of the single-permutation encrypted Davies-Meyer construction
- Beyond birthday bound secure MAC in faulty nonce model
- Distance between sampling with and without replacement
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
- Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method
- How many queries are needed to distinguish a truncated random permutation from a random function?
- How to build pseudorandom functions from public random permutations
- Indifferentiability of the Sum of Random Permutations Toward Optimal Security
- Indifferentiability of truncated random permutations
- Information-theoretic indistinguishability via the chi-squared method
- Key-alternating ciphers and key-length extension: exact bounds and multi-user security
- Linking Stam's bounds with generalized truncation
- Luby-Rackoff backwards with more users and more security
- Mind the composition: birthday bound attacks on EWCDMD and SoKAC21
- Multi-key security: the Even-Mansour construction revisited
- On the XOR of multiple random permutations
- Optimally secure block ciphers from ideal primitives
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds
- The Multi-user Security of Double Encryption
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- The indistinguishability of the XOR of \(k\) permutations
- The sum of PRPs is a secure PRF
- The summation-truncation hybrid: reusing discarded bits for free
- Toward a fully secure authenticated encryption scheme from a pseudorandom permutation
Cited in
(5)- Luby-Rackoff backwards with more users and more security
- Improved multi-user security using the squared-ratio method
- How many queries are needed to distinguish a truncated random permutation from a random function?
- A sponge-based PRF with good multi-user security
- Tight indistinguishability bounds for the XOR of independent random permutations by Fourier analysis
This page was built for publication: Multi-user security of the sum of truncated random permutations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6132432)