Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Key-alternating ciphers and key-length extension: exact bounds and multi-user security
The best existing bounds on the concrete security of key-alternating ciphers (Chen and
Steinberger, EUROCRYPT'14) are only asymptotically tight, and the quantitative gap with …
Steinberger, EUROCRYPT'14) are only asymptotically tight, and the quantitative gap with …
Randomized half-ideal cipher on groups with applications to UC (a) PAKE
Abstract An Ideal Cipher (IC) is a cipher where each key defines a random permutation on
the domain. Ideal Cipher on a group has many attractive applications, eg, the Encrypted Key …
the domain. Ideal Cipher on a group has many attractive applications, eg, the Encrypted Key …
KHAPE: asymmetric PAKE from key-hiding key exchange
OPAQUE [Jarecki et al., Eurocrypt 2018] is an asymmetric password authenticated key
exchange (aPAKE) protocol that is being developed as an Internet standard and for use …
exchange (aPAKE) protocol that is being developed as an Internet standard and for use …
Minimizing the two-round Even-Mansour cipher
The r-round (iterated) Even-Mansour cipher (also known as key-alternating cipher) defines a
block cipher from r fixed public n-bit permutations P 1,…, P r as follows: given a sequence of …
block cipher from r fixed public n-bit permutations P 1,…, P r as follows: given a sequence of …
Tweaking even-mansour ciphers
B Cogliati, R Lampe, Y Seurin - … , Santa Barbara, CA, USA, August 16-20 …, 2015 - Springer
We study how to construct efficient tweakable block ciphers in the Random Permutation
model, where all parties have access to public random permutation oracles. We propose a …
model, where all parties have access to public random permutation oracles. We propose a …
Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models
The random-permutation model (RPM) and the ideal-cipher model (ICM) are idealized
models that offer a simple and intuitive way to assess the conjectured standard-model …
models that offer a simple and intuitive way to assess the conjectured standard-model …
On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
B Cogliati, Y Seurin - Annual International Conference on the Theory and …, 2015 - Springer
Abstract The iterated Even-Mansour cipher is a construction of a block cipher from r public
permutations P_1, ..., P_r which abstracts in a generic way the structure of key-alternating …
permutations P_1, ..., P_r which abstracts in a generic way the structure of key-alternating …
Asymmetric PAKE with Low Computation and communication
Abstract In Crypto'21 Gu, Jarecki, and Krawczyk showed an asymmetric password
authenticated key exchange protocol (aPAKE) whose computational cost matches …
authenticated key exchange protocol (aPAKE) whose computational cost matches …
Indifferentiability of 8-round Feistel networks
Y Dai, J Steinberger - Annual International Cryptology Conference, 2016 - Springer
We prove that a balanced 8-round Feistel network is indifferentiable from a random
permutation, improving on previous 10-round results by Dachman-Soled et al. and Dai et al …
permutation, improving on previous 10-round results by Dachman-Soled et al. and Dai et al …
Layout Graphs, Random Walks and the t-Wise Independence of SPN Block Ciphers
We continue the study of t-wise independence of substitution-permutation networks (SPNs)
initiated by the recent work of Liu, Tessaro, and Vaikuntanathan (CRYPTO 2021). Our key …
initiated by the recent work of Liu, Tessaro, and Vaikuntanathan (CRYPTO 2021). Our key …