This paper revisits the fundamental cryptographic problem of building pseudorandom functions(PRFs)from pseudorandom permutations(PRPs).Weprovethat,SUMPIP,i.e. P⊕P−1, the sum of a PRP and its inverse, and EDMDSP, the single-permutation variant of the “dual” of the Encrypted Davies–Meyer scheme introduced by Mennink and Neves(CRYPTO2017), are secure PRFs up to 22n/3/n adversarial queries. To our best knowledge, SUMPIP is the first parallelizable, single-permutation-based, domain-preserving, beyond-birthday secure PRP-to-PRF conversion method
Pseudorandom Functions (PRFs), introduced by Goldreich, Goldwasser and Micali [9], allow one to e#c...
This paper fills an important foundational gap with the first proofs, under standard assumptions and...
We construct an algebraic pseudorandom function (PRF) that is more efficient than the classic Naor- ...
Given d independent pseudorandom permutations (PRPs) p_i, ..., p_d over {0,1}^n, it appears natural ...
We investigate, in a concrete security setting, several alternate characterizations of pseudorandom ...
In CRYPTO 2019, Chen et al. have initiated an interesting research direction in designing PRF based ...
Abstract. In the last years, much research work has been invested into the security analysis of key ...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
Observing the growing popularity of random permutation (RP)-based designs (e.g, Sponge), Bart Mennin...
For several decades, constructing pseudorandom functions from pseudorandom permutations, so-called L...
Part 2: Cryptography and CryptanalysisInternational audienceWithin many cryptographic systems a key ...
are one of the fundamental primitives for cryptographic protocol design. Most importantly, they prov...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
We propose a novel small-domain pseudo-random permutation, also referred to as a small-domain cipher...
Distributed pseudorandom functions (DPRFs) originally introduced by Naor, Pinkas and Reingold (EUROC...
Pseudorandom Functions (PRFs), introduced by Goldreich, Goldwasser and Micali [9], allow one to e#c...
This paper fills an important foundational gap with the first proofs, under standard assumptions and...
We construct an algebraic pseudorandom function (PRF) that is more efficient than the classic Naor- ...
Given d independent pseudorandom permutations (PRPs) p_i, ..., p_d over {0,1}^n, it appears natural ...
We investigate, in a concrete security setting, several alternate characterizations of pseudorandom ...
In CRYPTO 2019, Chen et al. have initiated an interesting research direction in designing PRF based ...
Abstract. In the last years, much research work has been invested into the security analysis of key ...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
Observing the growing popularity of random permutation (RP)-based designs (e.g, Sponge), Bart Mennin...
For several decades, constructing pseudorandom functions from pseudorandom permutations, so-called L...
Part 2: Cryptography and CryptanalysisInternational audienceWithin many cryptographic systems a key ...
are one of the fundamental primitives for cryptographic protocol design. Most importantly, they prov...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
We propose a novel small-domain pseudo-random permutation, also referred to as a small-domain cipher...
Distributed pseudorandom functions (DPRFs) originally introduced by Naor, Pinkas and Reingold (EUROC...
Pseudorandom Functions (PRFs), introduced by Goldreich, Goldwasser and Micali [9], allow one to e#c...
This paper fills an important foundational gap with the first proofs, under standard assumptions and...
We construct an algebraic pseudorandom function (PRF) that is more efficient than the classic Naor- ...