The tight security bound of the Key-Alternating Cipher (KAC) construction whose round permutations are independent from each other has been well studied. Then a natural question is how the security bound will change when we use fewer permutations in a KAC construction. In CRYPTO 2014, Chen et al. proved that 2-round KAC with a single permutation (2KACSP) has the same security level as the classic one (i.e., 2-round KAC). But we still know little about the security bound of incompletely-independent KAC constructions with more than 2 rounds. In this paper,we will show that a similar result also holds for 3-round case. More concretely, we prove that 3-round KAC with a single permutation (3KACSP) is secure up to $\varTheta(2^{\frac{3n}{4}})$ qu...
We put forth a new formulation of tamper-proof hardware in the Global Universal Composable (GUC) fra...
Secure multi-party computation (MPC) is a central cryptographic task that allows a set of mutually d...
In this thesis we consider different problems related to provable security and indifferentiability f...
We study information-theoretic secure multiparty protocols that achieve full security, including gua...
Abstract. The r-round (iterated) Even-Mansour cipher (also known as key-alternating cipher) defines ...
The r-round (iterated) Even-Mansour cipher (also known as key-alternating cipher) defines a block ci...
The Advanced Encryption Standard (AES) is the most widely used block cipher. The high level structur...
Katz and Ostrovsky (Crypto 2004) proved that five rounds are necessary for stand-alone general black...
We study the round complexity of secure multiparty computation (MPC) in the challenging model where ...
In CRYPTO 2015, Cogliati et al. have proposed one-round tweakable Even-Mansour (\textsf{1-TEM}) ciph...
A Rugged Pseudorandom Permutation (RPRP) is a variable-input-length tweakable cipher satisfying a se...
In [3] M. Luby and C. Rackoff have proved that 3-round random Feistel schemes are secure against all...
We present an efficient key wrapping scheme that uses a single public permutation as the basic eleme...
This paper considers - for the first time - the concept of key alternating ciphers in a provable sec...
Abstract. We analyze the security of the iterated Even-Mansour cipher (a.k.a. key-alternating cipher...
We put forth a new formulation of tamper-proof hardware in the Global Universal Composable (GUC) fra...
Secure multi-party computation (MPC) is a central cryptographic task that allows a set of mutually d...
In this thesis we consider different problems related to provable security and indifferentiability f...
We study information-theoretic secure multiparty protocols that achieve full security, including gua...
Abstract. The r-round (iterated) Even-Mansour cipher (also known as key-alternating cipher) defines ...
The r-round (iterated) Even-Mansour cipher (also known as key-alternating cipher) defines a block ci...
The Advanced Encryption Standard (AES) is the most widely used block cipher. The high level structur...
Katz and Ostrovsky (Crypto 2004) proved that five rounds are necessary for stand-alone general black...
We study the round complexity of secure multiparty computation (MPC) in the challenging model where ...
In CRYPTO 2015, Cogliati et al. have proposed one-round tweakable Even-Mansour (\textsf{1-TEM}) ciph...
A Rugged Pseudorandom Permutation (RPRP) is a variable-input-length tweakable cipher satisfying a se...
In [3] M. Luby and C. Rackoff have proved that 3-round random Feistel schemes are secure against all...
We present an efficient key wrapping scheme that uses a single public permutation as the basic eleme...
This paper considers - for the first time - the concept of key alternating ciphers in a provable sec...
Abstract. We analyze the security of the iterated Even-Mansour cipher (a.k.a. key-alternating cipher...
We put forth a new formulation of tamper-proof hardware in the Global Universal Composable (GUC) fra...
Secure multi-party computation (MPC) is a central cryptographic task that allows a set of mutually d...
In this thesis we consider different problems related to provable security and indifferentiability f...