Formulating and designing unforgeable authentication of classical messages in the presence of quantum adversaries has been a challenge, as the familiar classical notions of unforgeability do not directly translate into meaningful notions in the quantum setting. A particular difficulty is how to fairly capture the notion of "predicting an unqueried value" when the adversary can query in quantum superposition. In this work, we uncover serious shortcomings in existing approaches, and propose a new definition. We then support its viability by a number of constructions and characterizations. Specifically, we demonstrate a function which is secure according to the existing definition by Boneh and Zhandry, but is clearly vulnerable to a quantum fo...
Secure communication plays an important role in our everyday life, from the messages we send our fri...
Abstract. At CRYPTO 2013, Boneh and Zhandry initiated the study of quantum-secure encryption. They p...
In the presence of a quantum adversary, there are two possible definitions of security for a pseudor...
Formulating and designing authentication of classical messages in the presence of adversaries with q...
We study the problem of encrypting and authenticating quantum data in the presence of adversaries ma...
We prove the security of NMAC, HMAC, AMAC, and the cascade construction with fixed input-length as q...
Post-quantum cryptography studies the security of classical, i.e. non-quantum cryptographic protocol...
Physical Unclonable Functions (PUFs) are physical structures that are hard to clone and have a uniqu...
Strongly unforgeable signature schemes provide a more stringent security guarantee than the standard...
The research covered in this thesis is dedicated to provable post-quantum security of hash functions...
We prove the security of NMAC, HMAC, AMAC, and the cascade construction with fixed input-length as q...
Large-scale quantum computing poses a major threat to classical public-key cryptography. Recently, s...
Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing...
Abstract: In encryption, non-malleability is a highly desirable property: it ensures that adversarie...
Physical unclonable functions (PUFs) are physical structures that are hard to clone and have a uniqu...
Secure communication plays an important role in our everyday life, from the messages we send our fri...
Abstract. At CRYPTO 2013, Boneh and Zhandry initiated the study of quantum-secure encryption. They p...
In the presence of a quantum adversary, there are two possible definitions of security for a pseudor...
Formulating and designing authentication of classical messages in the presence of adversaries with q...
We study the problem of encrypting and authenticating quantum data in the presence of adversaries ma...
We prove the security of NMAC, HMAC, AMAC, and the cascade construction with fixed input-length as q...
Post-quantum cryptography studies the security of classical, i.e. non-quantum cryptographic protocol...
Physical Unclonable Functions (PUFs) are physical structures that are hard to clone and have a uniqu...
Strongly unforgeable signature schemes provide a more stringent security guarantee than the standard...
The research covered in this thesis is dedicated to provable post-quantum security of hash functions...
We prove the security of NMAC, HMAC, AMAC, and the cascade construction with fixed input-length as q...
Large-scale quantum computing poses a major threat to classical public-key cryptography. Recently, s...
Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing...
Abstract: In encryption, non-malleability is a highly desirable property: it ensures that adversarie...
Physical unclonable functions (PUFs) are physical structures that are hard to clone and have a uniqu...
Secure communication plays an important role in our everyday life, from the messages we send our fri...
Abstract. At CRYPTO 2013, Boneh and Zhandry initiated the study of quantum-secure encryption. They p...
In the presence of a quantum adversary, there are two possible definitions of security for a pseudor...