On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks

B Cogliati, Y Seurin - Annual International Conference on the Theory and …, 2015 - Springer
Abstract The iterated Even-Mansour cipher is a construction of a block cipher from r public
permutations P_1, ..., P_r which abstracts in a generic way the structure of key-alternating …

Revisiting the indifferentiability of the sum of permutations

A Gunsing, R Bhaumik, A Jha, B Mennink… - Annual International …, 2023 - Springer
The sum of two n-bit pseudorandom permutations is known to behave like a pseudorandom
function with n bits of security. A recent line of research has investigated the security of two …

Towards understanding the known-key security of block ciphers

E Andreeva, A Bogdanov, B Mennink - … FSE 2013, Singapore, March 11-13 …, 2014 - Springer
Known-key distinguishers for block ciphers were proposed by Knudsen and Rijmen at
ASIACRYPT 2007 and have been a major research topic in cryptanalysis since then. A …

On the public indifferentiability and correlation intractability of the 6-round Feistel construction

A Mandal, J Patarin, Y Seurin - Theory of Cryptography: 9th Theory of …, 2012 - Springer
We show that the Feistel construction with six rounds and random round functions is publicly
indifferentiable from a random invertible permutation (a result that is not known to hold for …

A modular approach to the incompressibility of block-cipher-based AEADs

A Hosoyamada, T Isobe, Y Todo, K Yasuda - International Conference on …, 2022 - Springer
Incompressibility is one of the most fundamental security goals in white-box cryptography.
Given recent advances in the design of efficient and incompressible block ciphers such as …

Strengthening the known-key security notion for block ciphers

B Cogliati, Y Seurin - … Encryption: 23rd International Conference, FSE 2016 …, 2016 - Springer
We reconsider the formalization of known-key attacks against ideal primitive-based block
ciphers. This was previously tackled by Andreeva, Bogdanov, and Mennink (FSE 2013), who …

Digital signatures with minimal overhead from indifferentiable random invertible functions

E Kiltz, K Pietrzak, M Szegedy - … , Santa Barbara, CA, USA, August 18-22 …, 2013 - Springer
In a digital signature scheme with message recovery, rather than transmitting the message
m and its signature σ, a single enhanced signature τ is transmitted. The verifier is able to …

Hardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSA

M Bellare, H Davis, Z Di - IACR International Conference on Public-Key …, 2023 - Springer
We consider a transform, called Derive-then-Derandomize, that hardens a given signature
scheme against randomness failure and implementation error. We prove that it works. We …

[图书][B] Securing the Standards: Bringing Cryptographic Security Proofs Closer to the Real World

HE Davis - 2023 - search.proquest.com
Cryptographic standards published by organizations like NIST, ISO, and the IETF provide
guidance for developers choosing and implementing cryptographic algorithms for their …

Provable security of symmetric-key cryptographic schemes in classical and quantum frameworks

J Ethan - 2024 - publikationen.sulb.uni-saarland.de
In this dissertation, we focus on designing secure symmetric-key schemes by identifying
flaws, proposing new constructions, and providing rigorous security proofs against classical …