Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory

From MaRDI portal
Publication:1675220

DOI10.1007/978-3-319-63697-9_19zbMath1418.94056OpenAlexW2733461682MaRDI QIDQ1675220

Samuel Neves, Bart Mennink

Publication date: 27 October 2017

Full work available at URL: https://ir.cwi.nl/pub/26761




Related Items (25)

Extending AES improvements: A proposal for Alpha-MAC in view of collision resistanceTowards tight security of cascaded LRW2Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) methodOptimal forgeries against polynomial-based MACs and GCMBeyond-birthday security for permutation-based Feistel networks\(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutationsBeyond-birthday secure domain-preserving PRFs from a single permutationKeyed sum of permutations: a simpler RP-based PRFTight security of cascaded LRW2Proof of mirror theory for a wide range of \(\xi_{\max }\)Multi-user security of the sum of truncated random permutationsA modular approach to the security analysis of two-permutation constructionsImproved multi-user security using the squared-ratio methodFine-tuning the ISO/IEC standard \textsf{LightMAC}Categorization of faulty nonce misuse resistant message authentication\textsf{tHyENA}: making \textsf{HyENA} even smallerThe Relation Between CENC and NEMOQuantum attacks on PRFs based on public random permutationsTowards closing the security gap of Tweak-aNd-Tweak (TNT)Improved security analysis for nonce-based enhanced hash-then-mask MACsHow to build optimally secure PRFs using block ciphersA note on the chi-square method: a tool for proving cryptographic securityAnalysis of the single-permutation encrypted Davies-Meyer constructionMind the composition: birthday bound attacks on EWCDMD and SoKAC21The summation-truncation hybrid: reusing discarded bits for free







This page was built for publication: Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory