Revisiting the indifferentiability of the sum of permutations
From MaRDI portal
Publication:6186774
Recommendations
- Indifferentiability beyond the birthday bound for the xor of two public random permutations
- On the XOR of multiple random permutations
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method
- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
- Indifferentiability of truncated random permutations
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 1302860 (Why is no real title available?)
- scientific article; zbMATH DE number 1303128 (Why is no real title available?)
- scientific article; zbMATH DE number 1406792 (Why is no real title available?)
- scientific article; zbMATH DE number 4185033 (Why is no real title available?)
- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
- Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions
- Block-cipher-based tree hashing
- Building a Collision-Resistant Compression Function from Non-compressing Primitives
- Domain Extension of Public Random Functions: Beyond the Birthday Barrier
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method
- Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?
- Indifferentiability beyond the birthday bound for the xor of two public random permutations
- Indifferentiability of the Sum of Random Permutations Toward Optimal Security
- Information-theoretic indistinguishability via the chi-squared method
- Leaky Random Oracle (Extended Abstract)
- Merkle-Damgård Revisited: How to Construct a Hash Function
- On the XOR of multiple random permutations
- On the public indifferentiability and correlation intractability of the 6-round Feistel construction
- Salvaging Merkle-Damgård for Practical Applications
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- The sum of PRPs is a secure PRF
- Theory of Cryptography
Cited in
(2)
This page was built for publication: Revisiting the indifferentiability of the sum of permutations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6186774)