Crooked indifferentiability of enveloped XOR revisited
From MaRDI portal
Publication:6157572
DOI10.1007/978-3-030-92518-5_4zbMath1514.94045OpenAlexW4205122616MaRDI QIDQ6157572
Mridul Nandi, Rishiraj Bhattacharyya, Anik Raychaudhuri
Publication date: 12 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-92518-5_4
Cites Work
- Improved indifferentiability security bound for the JH mode
- Random oracles and non-uniformity
- Correcting subverted random oracles
- Indifferentiability of double-block-length hash function without feed-forward operations
- Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
- Indifferentiability of Double Length Compression Functions
- Security of Symmetric Encryption against Mass Surveillance
- Cliptography: Clipping the Power of Kleptographic Attacks
- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6
- The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?
- Improved Indifferentiability Security Analysis of chopMD Hash Function
- Security Analysis of the Mode of JH Hash Function
- On the Indifferentiability of the Grøstl Hash Function
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions
- Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited
- Merkle-Damgård Revisited: How to Construct a Hash Function
- On the Indifferentiability of the Sponge Construction
- Theory of Cryptography
This page was built for publication: Crooked indifferentiability of enveloped XOR revisited