A number of cryptographic schemes are built from (keyless) permutations, which are either designed in an ad-hoc fashion or are obtained by fixing the key in a block cipher. Security proofs for these schemes, however, idealize this permutation, i.e., making it random and accessible, as an oracle, to all parties. Finding plausible concrete assumptions on such permutations that guarantee security of the resulting schemes has remained an elusive open question. This paper initiates the study of standard-model assumptions on permutations -- or more precisely, on families of permutations indexed by a {\em public} seed. We introduce the notion of a {\em public-seed pseudorandom permutation} (psPRP), which is inspired by the UCE notion by Bellare, ...
International audienceWe revisit the problem of proving that a user algorithm se-lected and correctl...
In this article, we discuss a naive method of randomness reduction for cryptographic schemes, which ...
Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In pr...
We provide a formal treatment of backdoored pseudorandom generators (PRGs). Here a saboteur chooses ...
Randomness plays an important role in multiple applications in cryptography. It is required in funda...
A backdoored Pseudorandom Generator (PRG) is a PRG which looks pseudorandom to the outside world, bu...
Recent advances in block-cipher theory deliver security analyses in models where one or more underly...
In this thesis we consider different problems related to provable security and indifferentiability f...
Abstract. We present PEP, which is a new construction of a tweak-able strong pseudo-random permutati...
We show the first positive results for the indifferentiability security of the confusion-diffusion n...
AbstractFour round Feistel permutation (like DES) is super-pseudorandom if each round function is ra...
Abstract. We propose generic constructions of public-key encryption schemes, satisfying key- depende...
This paper fills an important foundational gap with the first proofs, under standard assumptions and...
This paper provides a (standard-model) notion of security for (keyed) hash functions, called UCE, th...
The theory of designing block ciphers is mature, having seen significant progress since the early 19...
International audienceWe revisit the problem of proving that a user algorithm se-lected and correctl...
In this article, we discuss a naive method of randomness reduction for cryptographic schemes, which ...
Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In pr...
We provide a formal treatment of backdoored pseudorandom generators (PRGs). Here a saboteur chooses ...
Randomness plays an important role in multiple applications in cryptography. It is required in funda...
A backdoored Pseudorandom Generator (PRG) is a PRG which looks pseudorandom to the outside world, bu...
Recent advances in block-cipher theory deliver security analyses in models where one or more underly...
In this thesis we consider different problems related to provable security and indifferentiability f...
Abstract. We present PEP, which is a new construction of a tweak-able strong pseudo-random permutati...
We show the first positive results for the indifferentiability security of the confusion-diffusion n...
AbstractFour round Feistel permutation (like DES) is super-pseudorandom if each round function is ra...
Abstract. We propose generic constructions of public-key encryption schemes, satisfying key- depende...
This paper fills an important foundational gap with the first proofs, under standard assumptions and...
This paper provides a (standard-model) notion of security for (keyed) hash functions, called UCE, th...
The theory of designing block ciphers is mature, having seen significant progress since the early 19...
International audienceWe revisit the problem of proving that a user algorithm se-lected and correctl...
In this article, we discuss a naive method of randomness reduction for cryptographic schemes, which ...
Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In pr...