Orthros: a low-latency PRF

S Banik, T Isobe, F Liu, K Minematsu… - IACR Transactions on …, 2021 - tosc.iacr.org
We present Orthros, a 128-bit block pseudorandom function. It is designed with primary
focus on latency of fully unrolled circuits. For this purpose, we adopt a parallel structure …

Critical perspectives on provable security: Fifteen years of" another look" papers

N Koblitz, A Menezes - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Contents Page 1 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …

Permutation based EDM: an inverse free BBB secure PRF

A Dutta, M Nandi, S Talnikar - IACR Transactions on Symmetric …, 2021 - tosc.iacr.org
In CRYPTO 2019, Chen et al. have initiated an interesting research direction in designing
PRF based on public permutations. They have proposed two beyond the birthday bound …

Multi-user security of the sum of truncated random permutations

W Choi, H Kim, J Lee, Y Lee - International Conference on the Theory and …, 2022 - Springer
For several decades, constructing pseudorandom functions from pseudorandom
permutations, so-called Luby-Rackoff backward construction, has been a popular …

[HTML][HTML] Quantum attacks on Sum of Even-Mansour pseudorandom functions

K Shinagawa, T Iwata - Information Processing Letters, 2022 - Elsevier
At CRYPTO 2019, constructions of a pseudorandom function from public random
permutations were presented. We consider one of the constructions called Sum of Even …

Simon's algorithm and symmetric crypto: Generalizations and automatized applications

F Canale, G Leander, L Stennes - Annual International Cryptology …, 2022 - Springer
In this paper we deepen our understanding of how to apply Simon's algorithm to break
symmetric cryptographic primitives. On the one hand, we automate the search for new …

BBB secure nonce based MAC using public permutations

A Dutta, M Nandi - Progress in Cryptology-AFRICACRYPT 2020: 12th …, 2020 - Springer
In the recent trend of CAESAR competition and NIST light-weight competition, cryptographic
community have witnessed the submissions of several cryptographic schemes that are build …

A modular approach to the security analysis of two-permutation constructions

YL Chen - International Conference on the Theory and …, 2022 - Springer
Constructions based on two public permutation calls are very common in today's
cryptographic community. However, each time a new construction is introduced, a dedicated …

Mind the composition: birthday bound attacks on EWCDMD and SoKAC21

M Nandi - Annual International Conference on the Theory and …, 2020 - Springer
In an early version of CRYPTO'17, Mennink and Neves proposed EWCDMD, a dual of
EWCDM, and showed n-bit security, where n is the block size of the underlying block cipher …

Multi-user BBB security of public permutations based MAC

YL Chen, A Dutta, M Nandi - Cryptography and Communications, 2022 - Springer
At CRYPTO 2019, Chen et al. have shown a beyond the birthday bound secure n-bit to n-bit
PRF based on public random permutations. Followed by the work, Dutta and Nandi have …