This paper fills an important foundational gap with the first proofs, under standard assumptions and in the standard model, of the existence of pseudorandom functions (PRFs) and pseudorandom permutations (PRPs) resisting rich and relevant forms of related-key attacks (RKA). An RKA allows the adversary to query the function not only under the target key but under other keys derived from it in adversary-specified ways. Based on the Naor-Reingold PRF we obtain an RKA-PRF whose keyspace is a group and that is proven, under DDH, to resist attacks in which the key may be operated on by arbitrary adversary-specified group elements. Previous work was able only to provide schemes in idealized models (ideal cipher, random oracle), under new, non-stan...
In this paper, we build a framework for constructing Constrained Pseudorandom Functions (CPRFs) with...
Note. This is an out of date draft and here for reference only. This paper has been superseded and r...
Constrained pseudorandom functions (introduced independently by Boneh and Waters (CCS 2013), Boyle, ...
Building cryptographic primitives that are secure against related-key attacks (RKAs) is a well-studi...
Related-key attacks (RKAs) concern the security of cryptographic primitives in the situation where t...
The theory of designing block ciphers is mature, having seen significant progress since the early 19...
In a related-key attack (RKA) an adversary attempts to break a cryptographic primitive by invoking t...
A pseudorandom function (PRF) is a keyed function F : K × X → Y where, for a random key k ∈ K, the f...
Abstract The theory of designing block ciphers is mature, having seen significant progress since the...
Due to the vast number of successful related-key attacks against existing block-ciphers, related-key...
In this work, we provide a new algebraic framework for pseudorandom functions which encompasses many...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
Pseudorandom Functions (PRFs), introduced by Goldreich, Goldwasser and Micali, allow one to efficien...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
Abstract. Related-key attacks are attacks against constructions which use a secret key (such as a bl...
In this paper, we build a framework for constructing Constrained Pseudorandom Functions (CPRFs) with...
Note. This is an out of date draft and here for reference only. This paper has been superseded and r...
Constrained pseudorandom functions (introduced independently by Boneh and Waters (CCS 2013), Boyle, ...
Building cryptographic primitives that are secure against related-key attacks (RKAs) is a well-studi...
Related-key attacks (RKAs) concern the security of cryptographic primitives in the situation where t...
The theory of designing block ciphers is mature, having seen significant progress since the early 19...
In a related-key attack (RKA) an adversary attempts to break a cryptographic primitive by invoking t...
A pseudorandom function (PRF) is a keyed function F : K × X → Y where, for a random key k ∈ K, the f...
Abstract The theory of designing block ciphers is mature, having seen significant progress since the...
Due to the vast number of successful related-key attacks against existing block-ciphers, related-key...
In this work, we provide a new algebraic framework for pseudorandom functions which encompasses many...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
Pseudorandom Functions (PRFs), introduced by Goldreich, Goldwasser and Micali, allow one to efficien...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
Abstract. Related-key attacks are attacks against constructions which use a secret key (such as a bl...
In this paper, we build a framework for constructing Constrained Pseudorandom Functions (CPRFs) with...
Note. This is an out of date draft and here for reference only. This paper has been superseded and r...
Constrained pseudorandom functions (introduced independently by Boneh and Waters (CCS 2013), Boyle, ...