We propose a novel small-domain pseudo-random permutation, also referred to as a small-domain cipher or small-domain (deterministic) encryption. We prove that our construction achieves strong security , i.e., is indistinguishable from a random permutation even when an adversary has observed all possible input-output pairs. More importantly, our construction is 1,000 to 8,000 times faster in most realistic scenarios, in comparison with the best known construction (also achieving strong security). Our implementation leverages the extended instruction sets of modern processors, and we also introduce a smart caching strategy to freely tune the tradeoff between time and space
Pseudorandom generators are a basic foundation of many cryptographic services and information securi...
Existing proofs that deduce BPP=P from circuit lower bounds convert randomized algorithms into deter...
Abstract. We present a pseudo-random bit generator expanding a uniformly random bit-string r of leng...
Pseudorandom functions (PRFs) are one of the most fundamental building blocks in cryptography with n...
Abstract. Recent advances in block-cipher theory deliver security analyses in models where one or mo...
Recent advances in block-cipher theory deliver security analyses in models where one or more underly...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
We construct a reasonably efficient threshold and proactive pseudo-random permutation (PRP). Our pro...
We present a simple new construction of a pseudorandom bit generator. It stretches a short string of...
Fine-grained cryptographic primitives are ones that are secure against adversaries with an a-priori ...
This paper revisits the fundamental cryptographic problem of building pseudorandom functions(PRFs)fr...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
It has long been known that cryptographic schemes offering provably unbreakable security exist - nam...
Abstract. Existing symmetric encryption algorithms target messages consisting of elementary binary b...
Pseudorandom generators are a basic foundation of many cryptographic services and information securi...
Existing proofs that deduce BPP=P from circuit lower bounds convert randomized algorithms into deter...
Abstract. We present a pseudo-random bit generator expanding a uniformly random bit-string r of leng...
Pseudorandom functions (PRFs) are one of the most fundamental building blocks in cryptography with n...
Abstract. Recent advances in block-cipher theory deliver security analyses in models where one or mo...
Recent advances in block-cipher theory deliver security analyses in models where one or more underly...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
We construct a reasonably efficient threshold and proactive pseudo-random permutation (PRP). Our pro...
We present a simple new construction of a pseudorandom bit generator. It stretches a short string of...
Fine-grained cryptographic primitives are ones that are secure against adversaries with an a-priori ...
This paper revisits the fundamental cryptographic problem of building pseudorandom functions(PRFs)fr...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
It has long been known that cryptographic schemes offering provably unbreakable security exist - nam...
Abstract. Existing symmetric encryption algorithms target messages consisting of elementary binary b...
Pseudorandom generators are a basic foundation of many cryptographic services and information securi...
Existing proofs that deduce BPP=P from circuit lower bounds convert randomized algorithms into deter...
Abstract. We present a pseudo-random bit generator expanding a uniformly random bit-string r of leng...