A Rugged Pseudorandom Permutation (RPRP) is a variable-input-length tweakable cipher satisfying a security notion that is intermediate between tweakable PRP and tweakable SPRP. It was introduced at CRYPTO 2022 by Degabriele and Karadžić, who additionally showed how to generically convert such a primitive into nonce-based and nonce-hiding AEAD schemes satisfying either misuse-resistance or release-of-unverified-plaintext security as well as Nonce-Set AEAD which has applications in protocols like QUIC and DTLS. Their work shows that RPRPs are powerful and versatile cryptographic primitives. However, the RPRP security notion itself can seem rather contrived, and the motivation behind it is not immediately clear. Moreover, they only provided a ...
Observing the growing popularity of random permutation (RP)-based designs (e.g, Sponge), Bart Mennin...
Let σ be some positive integer and C ⊆ {(i, j) : 1 ≤ i < j ≤ σ}. The theory behind finding a lower b...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
We introduce a new security notion that lies right in between pseudorandom permutations (PRPs) and s...
A number of cryptographic schemes are built from (keyless) permutations, which are either designed i...
Abstract. We present PEP, which is a new construction of a tweak-able strong pseudo-random permutati...
This paper fills an important foundational gap with the first proofs, under standard assumptions and...
Pseudorandom Functions (PRFs), introduced by Goldreich, Goldwasser and Micali, allow one to efficien...
We propose a novel small-domain pseudo-random permutation, also referred to as a small-domain cipher...
We provide a new definitional framework capturing the multi-user security of encryption schemes and ...
Lecture Notes in Computer Science, Volume 8540, 2015.It is well known that the classical three- and ...
The tight security bound of the Key-Alternating Cipher (KAC) construction whose round permutations a...
In [3] M. Luby and C. Rackoff have proved that 3-round random Feistel schemes are secure against all...
Recent advances in block-cipher theory deliver security analyses in models where one or more underly...
In this thesis we consider different problems related to provable security and indifferentiability f...
Observing the growing popularity of random permutation (RP)-based designs (e.g, Sponge), Bart Mennin...
Let σ be some positive integer and C ⊆ {(i, j) : 1 ≤ i < j ≤ σ}. The theory behind finding a lower b...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
We introduce a new security notion that lies right in between pseudorandom permutations (PRPs) and s...
A number of cryptographic schemes are built from (keyless) permutations, which are either designed i...
Abstract. We present PEP, which is a new construction of a tweak-able strong pseudo-random permutati...
This paper fills an important foundational gap with the first proofs, under standard assumptions and...
Pseudorandom Functions (PRFs), introduced by Goldreich, Goldwasser and Micali, allow one to efficien...
We propose a novel small-domain pseudo-random permutation, also referred to as a small-domain cipher...
We provide a new definitional framework capturing the multi-user security of encryption schemes and ...
Lecture Notes in Computer Science, Volume 8540, 2015.It is well known that the classical three- and ...
The tight security bound of the Key-Alternating Cipher (KAC) construction whose round permutations a...
In [3] M. Luby and C. Rackoff have proved that 3-round random Feistel schemes are secure against all...
Recent advances in block-cipher theory deliver security analyses in models where one or more underly...
In this thesis we consider different problems related to provable security and indifferentiability f...
Observing the growing popularity of random permutation (RP)-based designs (e.g, Sponge), Bart Mennin...
Let σ be some positive integer and C ⊆ {(i, j) : 1 ≤ i < j ≤ σ}. The theory behind finding a lower b...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...