Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis

I Dinur - Annual International Conference on the Theory and …, 2024 - Springer
The XOR of two independent permutations (XoP) is a well-known construction for achieving
security beyond the birthday bound when implementing a pseudorandom function using a …

[PDF][PDF] Fine-Tuning Ideal Worlds for the Xor of Two Permutation Outputs.

W Choi, M Hhan, Y Wei, V Zikas - IACR Cryptol. ePrint Arch., 2023 - askworkshop.github.io
Fine-Tuning Ideal Worlds for the Xor of Two Permutation Outputs Page 1 Xor of Two Permutations
MACs PRF* Security Improving MAC Security Conclusion Technical Details Fine-Tuning Ideal …

Information-theoretic security with asymmetries

T Beyne, YL Chen - Annual International Cryptology Conference, 2024 - Springer
In this paper, we study the problem of lower bounding any given cost function depending on
the false positive and false negative probabilities of adversaries against indistinguishability …

Combining Outputs of a Random Permutation: New Constructions and Tight Security Bounds by Fourier Analysis

I Dinur - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We consider constructions that combine outputs of a single permutation $\pi:\{0, 1\}^
n\rightarrow\{0, 1\}^ n $ using a public function. These are popular constructions for …

[PDF][PDF] Refined Techniques for Compression Side-Channel Attacks

Y Song - 2024 - ethz.ch
A cryptosystem that performs compression before encryption may leak information about the
plaintext from the ciphertext length, giving rise to a compression side channel. An attacker …

CRYPTO 2024

L Reyzin, D Stebila - Springer
The 44th International Cryptology Conference (CRYPTO 2024) was held at the University of
California, Santa Barbara, California, USA, from August 18th to August 22nd, 2024. It is an …