Adventures in Crypto Dark Matter: Attacks, Fixes and Analysis for Weak Pseudorandom Function Candidates
暂无分享,去创建一个
Jung Hee Cheon | Jeong Han Kim | Wonhee Cho | Jiseung Kim | J. Cheon | Jiseung Kim | Wonhee Cho | J. Kim
[1] Ivan Damgård,et al. Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security , 2002, CRYPTO.
[2] Krzysztof Pietrzak,et al. A Leakage-Resilient Mode of Operation , 2009, EUROCRYPT.
[3] Alon Rosen,et al. Candidate weak pseudorandom functions in AC0 ○ MOD2 , 2014, ITCS.
[4] Yuval Ishai,et al. On the Complexity of Decomposable Randomized Encodings, Or: How Friendly Can a Garbling-Friendly PRF Be? , 2020, ITCS.
[5] Ueli Maurer,et al. A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security , 2007, EUROCRYPT.
[6] Peter Schwabe,et al. Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB , 2009, IACR Cryptol. ePrint Arch..
[7] David A. Wagner,et al. A Generalized Birthday Problem , 2002, CRYPTO.
[8] Vinod Vaikuntanathan,et al. From Selective to Adaptive Security in Functional Encryption , 2015, CRYPTO.
[9] D. Bernstein. Better price-performance ratios for generalized birthday attacks , 2007 .
[10] María Naya-Plasencia,et al. Optimal Merging in Quantum k-xor and k-xor-sum Algorithms , 2020, EUROCRYPT.
[11] Mihir Bellare,et al. New Proofs for NMAC and HMAC: Security without Collision Resistance , 2006, Journal of Cryptology.
[12] Benny Applebaum,et al. Bootstrapping Obfuscators via Fast Pseudorandom Functions , 2014, ASIACRYPT.
[13] Yu Sasaki,et al. Refinements of the k-tree Algorithm for the Generalized Birthday Problem , 2015, ASIACRYPT.
[14] Alon Rosen,et al. Pseudorandom Functions: Three Decades Later , 2017, Tutorials on the Foundations of Cryptography.
[15] Daniele Micciancio,et al. On the Bit Security of Cryptographic Primitives , 2018, IACR Cryptol. ePrint Arch..
[16] Minki Hhan,et al. Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation , 2019, IACR Cryptol. ePrint Arch..
[17] Oded Goldreich,et al. Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme , 1986, CRYPTO.
[18] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[19] Vinod Vaikuntanathan,et al. GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates , 2018, IACR Cryptol. ePrint Arch..