peer reviewedWe describe the first domain extender for ideal ciphers, i.e. we show a construction that is indifferentiable from a 2n-bit ideal cipher, given a n-bit ideal cipher. Our construction is based on a 3-round Feistel, and is more efficient than first building a n-bit random oracle from a n-bit ideal cipher (as in [9]) and then a 2n-bit ideal cipher from a n-bit random oracle (as in [10], using a 6-round Feistel). We also show that 2 rounds are not enough for indifferentiability by exhibiting a simple attack. We also consider our construction in the standard model: we show that 2 rounds are enough to get a 2n-bit tweakable block-cipher from a n-bit tweakable block-cipher and we show that with 3 rounds we can get beyond the birthday ...
The Advanced Encryption Standard (AES) is the most widely used block cipher. The high level structur...
Abstract. Feistel constructions have been shown to be indierentiable from random permutations at STO...
International audienceCoron et al. in TCC 2010 proposed a 2n-bit queryPlease check and confirm the c...
We revisit the question of constructing an ideal cipher from a random oracle. Coron et al.~(Journal ...
In this thesis we consider different problems related to provable security and indifferentiability f...
iii In this thesis we consider different problems related to provable security and in-differentiabil...
Block ciphers are an essential ingredient of modern cryptography. They are widely used as building ...
Recent advances in block-cipher theory deliver security analyses in models where one or more underly...
Abstract. The Random Oracle Model and the Ideal Cipher Model are two well known idealised models of ...
We revisit the question of constructing an ideal cipher from a random oracle. Coron et al. (Journal ...
Abstract. Recent advances in block-cipher theory deliver security analyses in models where one or mo...
This paper provides the first provably secure construction of an invertible random permutation (and ...
Coron et al. showed a construction of a 3-round 2n-bit cryptographic permutation from three independ...
We consider the cryptographic problem of constructing an invertible random permutation from a public...
The Advanced Encryption Standard (AES) is the most widely used block cipher. The high level structur...
The Advanced Encryption Standard (AES) is the most widely used block cipher. The high level structur...
Abstract. Feistel constructions have been shown to be indierentiable from random permutations at STO...
International audienceCoron et al. in TCC 2010 proposed a 2n-bit queryPlease check and confirm the c...
We revisit the question of constructing an ideal cipher from a random oracle. Coron et al.~(Journal ...
In this thesis we consider different problems related to provable security and indifferentiability f...
iii In this thesis we consider different problems related to provable security and in-differentiabil...
Block ciphers are an essential ingredient of modern cryptography. They are widely used as building ...
Recent advances in block-cipher theory deliver security analyses in models where one or more underly...
Abstract. The Random Oracle Model and the Ideal Cipher Model are two well known idealised models of ...
We revisit the question of constructing an ideal cipher from a random oracle. Coron et al. (Journal ...
Abstract. Recent advances in block-cipher theory deliver security analyses in models where one or mo...
This paper provides the first provably secure construction of an invertible random permutation (and ...
Coron et al. showed a construction of a 3-round 2n-bit cryptographic permutation from three independ...
We consider the cryptographic problem of constructing an invertible random permutation from a public...
The Advanced Encryption Standard (AES) is the most widely used block cipher. The high level structur...
The Advanced Encryption Standard (AES) is the most widely used block cipher. The high level structur...
Abstract. Feistel constructions have been shown to be indierentiable from random permutations at STO...
International audienceCoron et al. in TCC 2010 proposed a 2n-bit queryPlease check and confirm the c...