Crooked indifferentiability of enveloped XOR revisited
From MaRDI portal
Publication:6157572
DOI10.1007/978-3-030-92518-5_4zbMATH Open1514.94045OpenAlexW4205122616MaRDI QIDQ6157572FDOQ6157572
Authors: Rishiraj Bhattacharyya, Mridul Nandi, Anik Raychaudhuri
Publication date: 12 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-92518-5_4
Recommendations
- Limits of the cryptographic realization of Dolev-Yao-style XOR
- The indistinguishability of the XOR of \(k\) permutations
- scientific article; zbMATH DE number 7758304
- 2-Xor revisited: satisfiability and probabilities of functions
- Note on the integer geometry of bitwise XOR
- On asymmetric unification for the theory of XOR with a homomorphism
- An NP decision procedure for protocol insecurity with XOR
- The generalized XOR lemma
- A note on the relation between XOR and selective XOR lemmas
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method
Cites Work
- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Merkle-Damgård Revisited: How to Construct a Hash Function
- On the Indifferentiability of the Sponge Construction
- Theory of Cryptography
- Improved indifferentiability security bound for the JH mode
- Security analysis of the mode of JH hash function
- On the indifferentiability of the Grøstl hash function
- Improved Indifferentiability Security Analysis of chopMD Hash Function
- Indifferentiability characterization of hash functions and optimal bounds of popular domain extensions
- Random oracles and non-uniformity
- Indifferentiability of double length compression functions
- Security of symmetric encryption against mass surveillance
- Cliptography: clipping the power of kleptographic attacks
- The dark side of ``black-box cryptography or: should we trust Capstone?
- Fixing cracks in the concrete: random oracles with auxiliary input, revisited
- Correcting subverted random oracles
- Backdoors in pseudorandom number generators: possibility and impossibility results
- Indifferentiability of double-block-length hash function without feed-forward operations
Cited In (2)
This page was built for publication: Crooked indifferentiability of enveloped XOR revisited
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6157572)