Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory
From MaRDI portal
Publication:1675220
DOI10.1007/978-3-319-63697-9_19zbMath1418.94056OpenAlexW2733461682MaRDI QIDQ1675220
Publication date: 27 October 2017
Full work available at URL: https://ir.cwi.nl/pub/26761
Related Items (25)
Extending AES improvements: A proposal for Alpha-MAC in view of collision resistance ⋮ Towards tight security of cascaded LRW2 ⋮ Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method ⋮ Optimal forgeries against polynomial-based MACs and GCM ⋮ Beyond-birthday security for permutation-based Feistel networks ⋮ \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations ⋮ Beyond-birthday secure domain-preserving PRFs from a single permutation ⋮ Keyed sum of permutations: a simpler RP-based PRF ⋮ Tight security of cascaded LRW2 ⋮ Proof of mirror theory for a wide range of \(\xi_{\max }\) ⋮ Multi-user security of the sum of truncated random permutations ⋮ A modular approach to the security analysis of two-permutation constructions ⋮ Improved multi-user security using the squared-ratio method ⋮ Fine-tuning the ISO/IEC standard \textsf{LightMAC} ⋮ Categorization of faulty nonce misuse resistant message authentication ⋮ \textsf{tHyENA}: making \textsf{HyENA} even smaller ⋮ The Relation Between CENC and NEMO ⋮ Quantum attacks on PRFs based on public random permutations ⋮ Towards closing the security gap of Tweak-aNd-Tweak (TNT) ⋮ Improved security analysis for nonce-based enhanced hash-then-mask MACs ⋮ How to build optimally secure PRFs using block ciphers ⋮ A note on the chi-square method: a tool for proving cryptographic security ⋮ Analysis of the single-permutation encrypted Davies-Meyer construction ⋮ Mind the composition: birthday bound attacks on EWCDMD and SoKAC21 ⋮ The summation-truncation hybrid: reusing discarded bits for free
This page was built for publication: Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory