Randomized half-ideal cipher on groups with applications to UC (a)PAKE
From MaRDI portal
Publication:6083658
DOI10.1007/978-3-031-30589-4_5zbMath1528.94045OpenAlexW4365935387MaRDI QIDQ6083658
Stanislaw Jarecki, Yanqi Gu, Bruno Freitas dos Santos
Publication date: 8 December 2023
Published in: Advances in Cryptology – EUROCRYPT 2023 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-30589-4_5
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Improved domain extender for the ideal cipher
- Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
- Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: five rounds are necessary and sufficient
- Invalid curve attacks in a GLS setting
- KHAPE: Asymmetric PAKE from key-hiding key exchange
- Asymmetric PAKE with low computation \textit{and} communication
- Anonymous, robust post-quantum public key encryption
- Anonymity of NIST PQC round 3 KEMs
- Indifferentiability of 8-Round Feistel Networks
- On the Indifferentiability of Key-Alternating Ciphers
- Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings
- A Domain Extender for the Ideal Cipher
- How to Protect DES Against Exhaustive Key Search
- The Random Oracle Model and the Ideal Cipher Model Are Equivalent
- Communication Theory of Secrecy Systems*
- New directions in cryptography
- Keccak
- Secure integration of asymmetric and symmetric encryption schemes
- Producing a One-Way Hash Function from DES
- Universally Composable Password-Based Key Exchange
- The equivalence of the random oracle model and the ideal cipher model, revisited
- Feistel Networks Made Public, and Applications
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
- 10-Round Feistel is Indifferentiable from an Ideal Cipher
- Indifferentiability of Confusion-Diffusion Networks
- One Way Hash Functions and DES
This page was built for publication: Randomized half-ideal cipher on groups with applications to UC (a)PAKE