Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Quantum linearization attacks
Recent works have shown that quantum period-finding can be used to break many popular
constructions (some block ciphers such as Even-Mansour, multiple MACs and AEs...) in the …
constructions (some block ciphers such as Even-Mansour, multiple MACs and AEs...) in the …
Beyond birthday bound secure MAC in faulty nonce model
Abstract Encrypt-then-MAC (EtM) is a popular mode for authenticated encryption (AE).
Unfortunately, almost all designs following the EtM paradigm, including the AE suites for …
Unfortunately, almost all designs following the EtM paradigm, including the AE suites for …
Encrypt or decrypt? to make a single-key beyond birthday secure nonce-based MAC
Abstract At CRYPTO 2016, Cogliati and Seurin have proposed a highly secure nonce-based
MAC called Encrypted Wegman-Carter with Davies-Meyer (EWCDM EWCDM) construction …
MAC called Encrypted Wegman-Carter with Davies-Meyer (EWCDM EWCDM) construction …
Proof of Mirror Theory for ξmax = 2
In ICISC-05, and in the ePrint 2010/287, Patarin claimed a lower bound on the number of
tuples of-bit strings satisfying for such that, are distinct and. This result is known as Mirror …
tuples of-bit strings satisfying for such that, are distinct and. This result is known as Mirror …
Proof of Mirror Theory for a Wide Range of
In CRYPTO'03, Patarin conjectured a lower bound on the number of distinct solutions (P
1,…, P q)∈({0, 1} n) q satisfying a system of equations of the form X i⊕ X j= λ i, j such that P …
1,…, P q)∈({0, 1} n) q satisfying a system of equations of the form X i⊕ X j= λ i, j such that P …
Generic attacks against beyond-birthday-bound MACs
In this work, we study the security of several recent MAC constructions with provable security
beyond the birthday bound. We consider block-cipher based constructions with a double …
beyond the birthday bound. We consider block-cipher based constructions with a double …
Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting
Abstract Double-block Hash-then-Sum (DbHtS) MACs are a class of MACs that aim for
achieving beyond-birthday-bound security, including SUM-ECBC, PMAC_Plus, 3kf9 and …
achieving beyond-birthday-bound security, including SUM-ECBC, PMAC_Plus, 3kf9 and …
Revisiting variable output length XOR pseudorandom function
S Bhattacharya, M Nandi - IACR Transactions on Symmetric …, 2018 - tosc.iacr.org
Let σ be some positive integer and C⊆{(i, j): 1≤ i< j≤ σ}. The theory behind finding a lower
bound on the number of distinct blocks P1,..., Pσ∈{0, 1} n satisfying a set of linear equations …
bound on the number of distinct blocks P1,..., Pσ∈{0, 1} n satisfying a set of linear equations …
Attacks on beyond-birthday-bound macs in the quantum setting
T Guo, P Wang, L Hu, D Ye - … , PQCrypto 2021, Daejeon, South Korea, July …, 2021 - Springer
We systematically study the security of twelve Beyond-Birthday-Bound Message
Authentication Codes (BBB MACs) in the Q2 model where attackers have quantum-query …
Authentication Codes (BBB MACs) in the Q2 model where attackers have quantum-query …
Mind the composition: Birthday bound attacks on EWCDMD and sokac21
M Nandi - Annual International Conference on the Theory and …, 2020 - Springer
In an early version of CRYPTO'17, Mennink and Neves proposed EWCDMD, a dual of
EWCDM, and showed n-bit security, where n is the block size of the underlying block cipher …
EWCDM, and showed n-bit security, where n is the block size of the underlying block cipher …