Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
暂无分享,去创建一个
Kenneth G. Paterson | Fabrice Benhamouda | Michel Abdalla | Alain Passelègue | K. Paterson | Michel Abdalla | Fabrice Benhamouda | Alain Passelègue
[1] Silvio Micali,et al. How to Construct Random Functions (Extended Abstract) , 1984, FOCS.
[2] Jongsung Kim,et al. Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 , 2007, FSE.
[3] Kenneth G. Paterson,et al. RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures , 2012, IACR Cryptol. ePrint Arch..
[4] Lars R. Knudsen,et al. Cryptanalysis of LOKI91 , 1992, AUSCRYPT.
[5] Alex Biryukov,et al. Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds , 2010, IACR Cryptol. ePrint Arch..
[6] Moni Naor,et al. Number-theoretic constructions of efficient pseudo-random functions , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[7] Hoeteck Wee. Public Key Encryption against Related Key Attacks , 2012, Public Key Cryptography.
[8] Mihir Bellare,et al. A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications , 2003, EUROCRYPT.
[9] Eli Biham,et al. New types of cryptanalytic attacks using related keys , 1994, Journal of Cryptology.
[10] Moni Naor,et al. Number-theoretic constructions of efficient pseudo-random functions , 2004, JACM.
[11] David Cash,et al. Cryptography Secure Against Related-Key Attacks and Tampering , 2011, IACR Cryptol. ePrint Arch..
[12] Alptekin Küpçü,et al. Transparent, Distributed, and Replicated Dynamic Provable Data Possession , 2013, ACNS.
[13] Alex Biryukov,et al. Related-Key Cryptanalysis of the Full AES-192 and AES-256 , 2009, ASIACRYPT.
[14] Alex Biryukov,et al. Distinguisher and Related-Key Attack on the Full AES-256 , 2009, CRYPTO.
[15] Dan Boneh,et al. Key Homomorphic PRFs and Their Applications , 2013, CRYPTO.
[16] Christopher Umans,et al. Fast Polynomial Factorization and Modular Composition , 2011, SIAM J. Comput..
[17] Mihir Bellare,et al. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs , 2006, EUROCRYPT.
[18] Kevin Lewi,et al. Improved Constructions of PRFs Secure Against Related-Key Attacks , 2014, ACNS.
[19] Eli Biham,et al. Related-Key Boomerang and Rectangle Attacks , 2005, EUROCRYPT.
[20] David Cash,et al. Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks , 2010, CRYPTO.
[21] Eli Biham,et al. A Unified Approach to Related-Key Attacks , 2008, FSE.
[22] Adam O'Neill,et al. Correlated-Input Secure Hash Functions , 2011, TCC.
[23] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[24] Abhishek Banerjee,et al. New and Improved Key-Homomorphic Pseudorandom Functions , 2014, CRYPTO.