Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key

A Biryukov, C Bouillaguet, D Khovratovich - Advances in Cryptology …, 2014 - Springer
In this paper we pick up an old challenge to design public key or white-box constructions
from symmetric cipher components. We design several encryption schemes based on the …

Non-interactive zero-knowledge from LPN and MQ

Q Dao, A Jain, Z Jin - Annual International Cryptology Conference, 2024 - Springer
We give the first construction of non-interactive zero-knowledge (NIZK) arguments from post-
quantum assumptions other than Learning with Errors. In particular, we achieve NIZK under …

General linear group action on tensors: A candidate for post-quantum cryptography

Z Ji, Y Qiao, F Song, A Yun - Theory of cryptography conference, 2019 - Springer
Starting from the one-way group action framework of Brassard and Yung (Crypto'90), we
revisit building cryptography based on group actions. Several previous candidates for one …

The Legendre pseudorandom function as a multivariate quadratic cryptosystem: security and applications

IA Seres, M Horváth, P Burcsi - Applicable Algebra in Engineering …, 2023 - Springer
Sequences of consecutive Legendre and Jacobi symbols as pseudorandom bit generators
were proposed for cryptographic use in 1988. Major interest has been shown towards …

Key-recovery attacks on ASASA

B Minaud, P Derbez, PA Fouque, P Karpman - Journal of Cryptology, 2018 - Springer
The ASASA ASASA construction is a new design scheme introduced at Asiacrypt 2014 by
Biryukov, Bouillaguet and Khovratovich. Its versatility was illustrated by building two public …

Critical perspectives on provable security: Fifteen years of" another look" papers

N Koblitz, A Menezes - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Contents Page 1 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …

Degree of regularity for HFEv and HFEv

J Ding, BY Yang - International Workshop on Post-Quantum …, 2013 - Springer
In this paper, we first prove an explicit formula which bounds the degree of regularity of the
family of HFEv (“HFE with vinegar”) and HFEv-(“HFE with vinegar and minus”) multivariate …

Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism

A Fujioka, K Suzuki, K Xagawa… - Proceedings of the 8th …, 2013 - dl.acm.org
This paper discusses how to realize practical post-quantum authenticated key exchange
(AKE) with strong security, ie, CK+ security (Krawczyk, CRYPTO 2005). It is known that …

Pseudo flawed-smudging generators and their application to indistinguishability obfuscation

H Lin, C Matt - Cryptology ePrint Archive, 2018 - eprint.iacr.org
Abstract We introduce Pseudo Flawed-smudging Generators (PFGs). A PFG is an
expanding function whose outputs $\mathbf Y $ satisfy a weak form of pseudo-randomness …

Polly cracker, revisited

MR Albrecht, P Farshim, JC Faugere… - International conference on …, 2011 - Springer
We initiate the formal treatment of cryptographic constructions (“Polly Cracker”) based on the
hardness of computing remainders modulo an ideal over multivariate polynomial rings. We …