From Indifferentiability to Constructive Cryptography (and Back)
From MaRDI portal
Publication:3179350
DOI10.1007/978-3-662-53641-4_1zbMath1351.94057OpenAlexW2539263880MaRDI QIDQ3179350
Publication date: 21 December 2016
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53641-4_1
Related Items (9)
Composable and finite computational security of quantum message transmission ⋮ A unified and composable take on ratcheting ⋮ Anonymous authenticated communication ⋮ Giving an adversary guarantees (or: how to model designated verifier signatures in a composable framework) ⋮ Sequential indifferentiability of confusion-diffusion networks ⋮ Adaptive security of multi-party protocols, revisited ⋮ Classical leakage resilience from fault-tolerant quantum computation ⋮ Overcoming impossibility results in composable security using interval-wise guarantees ⋮ Quantum Authentication with Key Recycling
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Randomness is linear in space
- Constructing Confidential Channels from Authenticated Channels—Public-Key Encryption Revisited
- Confidentiality and Integrity: A Constructive Perspective
- Constructive Cryptography – A New Paradigm for Security Definitions and Proofs
- To Hash or Not to Hash Again? (In)Differentiability Results for $$H^2$$ and HMAC
- Careful with Composition: Limitations of the Indifferentiability Framework
- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6
- Bitwise Quantum Min-Entropy Sampling and New Lower Bounds for Random Access Codes
- Improved Indifferentiability Security Analysis of chopMD Hash Function
- On the Indifferentiability of the Grøstl Hash Function
- Resource-Restricted Indifferentiability
- The Operational Meaning of Min- and Max-Entropy
- Sampling of Min-Entropy Relative to Quantum Knowledge
- Advances in Cryptology - CRYPTO 2003
- Merkle-Damgård Revisited: How to Construct a Hash Function
- On the Indifferentiability of the Sponge Construction
- Theory of Cryptography
- Theory of Cryptography
This page was built for publication: From Indifferentiability to Constructive Cryptography (and Back)