Key-alternating ciphers and key-length extension: exact bounds and multi-user security

VT Hoang, S Tessaro - Advances in Cryptology–CRYPTO 2016: 36th …, 2016 - Springer
The best existing bounds on the concrete security of key-alternating ciphers (Chen and
Steinberger, EUROCRYPT'14) are only asymptotically tight, and the quantitative gap with …

Randomized half-ideal cipher on groups with applications to UC (a) PAKE

BFD Santos, Y Gu, S Jarecki - … International Conference on the Theory and …, 2023 - Springer
Abstract An Ideal Cipher (IC) is a cipher where each key defines a random permutation on
the domain. Ideal Cipher on a group has many attractive applications, eg, the Encrypted Key …

KHAPE: asymmetric PAKE from key-hiding key exchange

Y Gu, S Jarecki, H Krawczyk - … in Cryptology–CRYPTO 2021: 41st Annual …, 2021 - Springer
OPAQUE [Jarecki et al., Eurocrypt 2018] is an asymmetric password authenticated key
exchange (aPAKE) protocol that is being developed as an Internet standard and for use …

Minimizing the two-round Even-Mansour cipher

S Chen, R Lampe, J Lee, Y Seurin… - Annual Cryptology …, 2014 - Springer
The r-round (iterated) Even-Mansour cipher (also known as key-alternating cipher) defines a
block cipher from r fixed public n-bit permutations P 1,…, P r as follows: given a sequence of …

Tweaking even-mansour ciphers

B Cogliati, R Lampe, Y Seurin - … , Santa Barbara, CA, USA, August 16-20 …, 2015 - Springer
We study how to construct efficient tweakable block ciphers in the Random Permutation
model, where all parties have access to public random permutation oracles. We propose a …

Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models

S Coretti, Y Dodis, S Guo - Advances in Cryptology–CRYPTO 2018: 38th …, 2018 - Springer
The random-permutation model (RPM) and the ideal-cipher model (ICM) are idealized
models that offer a simple and intuitive way to assess the conjectured standard-model …

On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks

B Cogliati, Y Seurin - Annual International Conference on the Theory and …, 2015 - Springer
Abstract The iterated Even-Mansour cipher is a construction of a block cipher from r public
permutations P_1, ..., P_r which abstracts in a generic way the structure of key-alternating …

Asymmetric PAKE with Low Computation and communication

BF Dos Santos, Y Gu, S Jarecki, H Krawczyk - … International Conference on …, 2022 - Springer
Abstract In Crypto'21 Gu, Jarecki, and Krawczyk showed an asymmetric password
authenticated key exchange protocol (aPAKE) whose computational cost matches …

Indifferentiability of 8-round Feistel networks

Y Dai, J Steinberger - Annual International Cryptology Conference, 2016 - Springer
We prove that a balanced 8-round Feistel network is indifferentiable from a random
permutation, improving on previous 10-round results by Dachman-Soled et al. and Dai et al …

Layout Graphs, Random Walks and the t-Wise Independence of SPN Block Ciphers

T Liu, A Pelecanos, S Tessaro… - Annual International …, 2023 - Springer
We continue the study of t-wise independence of substitution-permutation networks (SPNs)
initiated by the recent work of Liu, Tessaro, and Vaikuntanathan (CRYPTO 2021). Our key …