We investigate, in a concrete security setting, several alternate characterizations of pseudorandom functions (PRFs) and pseudorandom permutations (PRPs). By analyzing the concrete complexity of the reductions between the standard notions and the alternate ones, we show that the latter, while equivalent under polynomial-time reductions, are weaker in the concrete security sense. With these alternate notions, we argue that it is possible to get better concrete security bounds for certain PRF/PRP-based schemes. As an example, we show how using an alternate characterization of a PRF could result in tighter security bounds for a certain class of message authentication codes. We also apply these techniques to give a simple concrete security anal...
Abstract. In the last years, much research work has been invested into the security analysis of key ...
A software watermarking scheme can embed a message into a program while preserving its functionality...
Constrained pseudorandom functions (introduced independently by Boneh and Waters (CCS 2013), Boyle, ...
We investigate, in a concrete security setting, several alternate characterizations of pseudorandom ...
Part 2: Cryptography and CryptanalysisInternational audienceWithin many cryptographic systems a key ...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
Abstract. Constrained pseudorandom functions have recently been introduced independently by Boneh an...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
Pseudorandom functions (PRFs) are one of the most fundamental primitives in cryptography. In this wo...
We construct an algebraic pseudorandom function (PRF) that is more efficient than the classic Naor- ...
This paper revisits the fundamental cryptographic problem of building pseudorandom functions(PRFs)fr...
We put forth the notion of publicly evaluable pseudorandom functions (PEPRFs), which is a non-trivia...
A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature t...
Distributed pseudorandom functions (DPRFs) originally introduced by Naor, Pinkas and Reingold (EUROC...
Abstract. In the last years, much research work has been invested into the security analysis of key ...
A software watermarking scheme can embed a message into a program while preserving its functionality...
Constrained pseudorandom functions (introduced independently by Boneh and Waters (CCS 2013), Boyle, ...
We investigate, in a concrete security setting, several alternate characterizations of pseudorandom ...
Part 2: Cryptography and CryptanalysisInternational audienceWithin many cryptographic systems a key ...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
Abstract. Constrained pseudorandom functions have recently been introduced independently by Boneh an...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
Pseudorandom functions (PRFs) are one of the most fundamental primitives in cryptography. In this wo...
We construct an algebraic pseudorandom function (PRF) that is more efficient than the classic Naor- ...
This paper revisits the fundamental cryptographic problem of building pseudorandom functions(PRFs)fr...
We put forth the notion of publicly evaluable pseudorandom functions (PEPRFs), which is a non-trivia...
A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature t...
Distributed pseudorandom functions (DPRFs) originally introduced by Naor, Pinkas and Reingold (EUROC...
Abstract. In the last years, much research work has been invested into the security analysis of key ...
A software watermarking scheme can embed a message into a program while preserving its functionality...
Constrained pseudorandom functions (introduced independently by Boneh and Waters (CCS 2013), Boyle, ...