Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks

From MaRDI portal
Publication:3582783

DOI10.1007/978-3-642-14623-7_36zbMath1283.94050OpenAlexW2156439207MaRDI QIDQ3582783

Mihir Bellare, David Cash

Publication date: 24 August 2010

Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_36




Related Items (28)

Non-malleable functions and their applicationsRelated-key analysis of generalized Feistel networks with expanding round functionsGarbling XOR gates ``for free in the standard modelAn Algebraic Framework for Pseudorandom Functions and Applications to Related-Key SecuritySecurity Against Related Randomness Attacks via Reconstructive ExtractorsSuper-strong RKA secure MAC, PKE and SE from tag-based hash proof systemPublic key encryption resilient to leakage and tampering attacksEfficient RKA-Secure KEM and IBE Schemes Against Invertible FunctionsSecure Message Authentication Against Related-Key AttackThe Chaining Lemma and Its ApplicationEfficient Public-Key Cryptography with Bounded Leakage and Tamper ResiliencePublic-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary FunctionsOn the related-key attack security of authenticated encryption schemesContinuously non-malleable codes against bounded-depth tamperingHow to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key AttacksModeling Random Oracles Under Unpredictable QueriesOn Cipher-Dependent Related-Key Attacks in the Ideal-Cipher ModelSubversion-resilient signatures: definitions, constructions and applicationsBounded tamper resilience: how to go beyond the algebraic barrierRelated-key security for pseudorandom functions beyond the linear barrierFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Clever Arbiters Versus Malicious AdversariesExpedient Non-malleability Notions for Hash FunctionsRelated-key secure key encapsulation from extended computational bilinear Diffie-HellmanProvable related-key security of contracting Feistel networksImpossibility on tamper-resilient cryptography with uniqueness properties




This page was built for publication: Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks