Building cryptographic primitives that are secure against related-key attacks (RKAs) is a well-studied problem by practitioners and theoreticians alike. Practical implementations of block ciphers take into account RKA security to mitigate fault injection attacks. The theoretical study of RKA security was initiated by Bellare and Kohno (Eurocrypt ’03). In Crypto 2010, Bellare and Cash introduce a framework for building RKA-secure pseudorandom functions (PRFs) and use this framework to construct RKA-secure PRFs based on the decision linear and DDH assumptions. We build RKA-secure PRFs by working with the Bellare-Cash framework and the LWE-and DLIN-based PRFs recently constructed by Boneh, Lewi, Montgomery, and Raghunathan (Crypto ’13). As a r...
A key-homomorphic pseudorandom function (PRF) family {Fs: D → R} allows one to efficiently compute t...
A key-homomorphic pseudorandom function (PRF) family {Fs: D → R} allows one to efficiently compute t...
We investigate, in a concrete security setting, several alternate characterizations of pseudorandom ...
Related-key attacks (RKAs) concern the security of cryptographic primitives in the situation where t...
In a related-key attack (RKA) an adversary attempts to break a cryptographic primitive by invoking t...
This paper fills an important foundational gap with the first proofs, under standard assumptions and...
Abstract The theory of designing block ciphers is mature, having seen significant progress since the...
The theory of designing block ciphers is mature, having seen significant progress since the early 19...
Pseudorandom functions (PRFs) are one of the most fundamental primitives in cryptography. In this wo...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
Abstract. In a related-key attack, the adversary is allowed to transform the secret key and request ...
Boneh et al. (Crypto 13) and Banerjee and Peikert (Crypto 14) constructed pseudorandom functions (PR...
We provide a framework enabling the construction of IBE schemes that are secure under related-key at...
Due to the vast number of successful related-key attacks against existing block-ciphers, related-key...
Abstract. Related-key attacks are attacks against constructions which use a secret key (such as a bl...
A key-homomorphic pseudorandom function (PRF) family {Fs: D → R} allows one to efficiently compute t...
A key-homomorphic pseudorandom function (PRF) family {Fs: D → R} allows one to efficiently compute t...
We investigate, in a concrete security setting, several alternate characterizations of pseudorandom ...
Related-key attacks (RKAs) concern the security of cryptographic primitives in the situation where t...
In a related-key attack (RKA) an adversary attempts to break a cryptographic primitive by invoking t...
This paper fills an important foundational gap with the first proofs, under standard assumptions and...
Abstract The theory of designing block ciphers is mature, having seen significant progress since the...
The theory of designing block ciphers is mature, having seen significant progress since the early 19...
Pseudorandom functions (PRFs) are one of the most fundamental primitives in cryptography. In this wo...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
Abstract. In a related-key attack, the adversary is allowed to transform the secret key and request ...
Boneh et al. (Crypto 13) and Banerjee and Peikert (Crypto 14) constructed pseudorandom functions (PR...
We provide a framework enabling the construction of IBE schemes that are secure under related-key at...
Due to the vast number of successful related-key attacks against existing block-ciphers, related-key...
Abstract. Related-key attacks are attacks against constructions which use a secret key (such as a bl...
A key-homomorphic pseudorandom function (PRF) family {Fs: D → R} allows one to efficiently compute t...
A key-homomorphic pseudorandom function (PRF) family {Fs: D → R} allows one to efficiently compute t...
We investigate, in a concrete security setting, several alternate characterizations of pseudorandom ...