Analysis of the single-permutation encrypted Davies-Meyer construction
From MaRDI portal
Publication:1801088
DOI10.1007/S10623-018-0470-9zbMath1442.94035OpenAlexW2790044991WikidataQ122654826 ScholiaQ122654826MaRDI QIDQ1801088
Benoît Cogliati, Yannick Seurin
Publication date: 26 October 2018
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-018-0470-9
Related Items (9)
\(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations ⋮ Beyond-birthday secure domain-preserving PRFs from a single permutation ⋮ Multi-user security of the sum of truncated random permutations ⋮ Better security-efficiency trade-offs in permutation-based two-party computation ⋮ Provably secure reflection ciphers ⋮ Tight security analysis of 3-round key-alternating cipher with a single permutation ⋮ Mind the composition: birthday bound attacks on EWCDMD and SoKAC21 ⋮ Multi-user BBB security of public permutations based MAC ⋮ Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions
Cites Work
- New hash functions and their use in authentication and set equality
- Information-theoretic indistinguishability via the chi-squared method
- Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory
- How many queries are needed to distinguish a truncated random permutation from a random function?
- A note on the chi-square method: a tool for proving cryptographic security
- On the XOR of Multiple Random Permutations
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
- Minimizing the Two-Round Even-Mansour Cipher
- The Indistinguishability of the XOR of $$k$$ Permutations
- Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations
- On Fast and Provably Secure Message Authentication Based on Universal Hashing
- The Iterated Random Permutation Problem with Applications to Cascade Encryption
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- The “Coefficients H” Technique
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Stronger Security Bounds for Wegman-Carter-Shoup Authenticators
- Tight Security Bounds for Key-Alternating Ciphers
- Probability and Computing
- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Analysis of the single-permutation encrypted Davies-Meyer construction