Universal hash functions (UHFs) have been extensively used in the design of cryptographic schemes. If we consider the related-key attack (RKA) against these UHF-based schemes, some of them may not be secure, especially those using the key of UHF as a part of the whole key of scheme, due to the weakness of UHF in the RKA setting. In order to solve the issue, we propose a new concept of related-key almost universal hash function, which is a natural extension to almost universal hash function in the RKA setting. We define related-key almost universal (RKA-AU) hash function and related-key almost XOR universal (RKA-AXU) hash function. However almost all the existing UHFs do not satisfy the new definitions. We construct one fixed-input-length ...
This paper fills an important foundational gap with the first proofs, under standard assumptions and...
This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on u...
The notion of a related-key attack (RKA) was formally introduced by Biham in 1993. It is essentially...
Abstract. Universal hash functions (UHFs) have been extensively used in the design of cryptographic ...
In this paper we investigate weak keys of universal hash functions (UHFs) from their combinatorial p...
Universal hashing, discovered by Carter and Wegman in 1979, has many important applications in compu...
Related-key attacks (RKAs) concern the security of cryptographic primitives in the situation where t...
Related-key attacks (RKA) are powerful cryptanalytic attacks, where the adversary can tamper with th...
Security against related-key attacks is an important criteria for modern cryptographic constructions...
Qin, Liu, Yuen, Deng, and Chen (PKC 2015) gave a new security notion of key-derivation function (KDF...
In this paper, we consider the security of public-key encryption schemes under linear related-key at...
In this article we describe new generic distinguishing and forgery attacks in the related-key scenar...
Message Authentication Code (MAC) is one of most basic primitives in cryptography. After Biham (EURO...
Wee (PKC'12) proposed a generic public-key encryption scheme in the setting of related-key attacks. ...
In a related-key attack (RKA) an adversary attempts to break a cryptographic primitive by invoking t...
This paper fills an important foundational gap with the first proofs, under standard assumptions and...
This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on u...
The notion of a related-key attack (RKA) was formally introduced by Biham in 1993. It is essentially...
Abstract. Universal hash functions (UHFs) have been extensively used in the design of cryptographic ...
In this paper we investigate weak keys of universal hash functions (UHFs) from their combinatorial p...
Universal hashing, discovered by Carter and Wegman in 1979, has many important applications in compu...
Related-key attacks (RKAs) concern the security of cryptographic primitives in the situation where t...
Related-key attacks (RKA) are powerful cryptanalytic attacks, where the adversary can tamper with th...
Security against related-key attacks is an important criteria for modern cryptographic constructions...
Qin, Liu, Yuen, Deng, and Chen (PKC 2015) gave a new security notion of key-derivation function (KDF...
In this paper, we consider the security of public-key encryption schemes under linear related-key at...
In this article we describe new generic distinguishing and forgery attacks in the related-key scenar...
Message Authentication Code (MAC) is one of most basic primitives in cryptography. After Biham (EURO...
Wee (PKC'12) proposed a generic public-key encryption scheme in the setting of related-key attacks. ...
In a related-key attack (RKA) an adversary attempts to break a cryptographic primitive by invoking t...
This paper fills an important foundational gap with the first proofs, under standard assumptions and...
This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on u...
The notion of a related-key attack (RKA) was formally introduced by Biham in 1993. It is essentially...