We introduce a new security notion that lies right in between pseudorandom permutations (PRPs) and strong pseudorandom permutations (SPRPs). We call this new security notion and any (tweakable) cipher that satisfies it a rugged pseudorandom permutation (RPRP). Rugged pseudorandom permutations lend themselves to some interesting applications, have practical benefits, and lead to novel cryptographic constructions. Our focus is on variable-length tweakable RPRPs, and analogous to the encode-then-encipher paradigm of Bellare and Rogaway, we can generically transform any such cipher into different AEAD schemes with varying security properties. However, the benefit of RPRPs is that they can be constructed more efficiently as they are weaker primi...
Abstract. Recent advances in block-cipher theory deliver security analyses in models where one or mo...
In this work we advance the study of leakage-resilient Authenticated Encryption with Associated Data...
This paper fills an important foundational gap with the first proofs, under standard assumptions and...
A Rugged Pseudorandom Permutation (RPRP) is a variable-input-length tweakable cipher satisfying a se...
Abstract. We present PEP, which is a new construction of a tweak-able strong pseudo-random permutati...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
The theory of designing block ciphers is mature, having seen significant progress since the early 19...
Leakage-resilient cryptosystems aim to maintain security in situations where their implementation le...
We propose definitions and constructions of authenticated encryption (AE) schemes that offer securit...
We argue that the invertibility of a block cipher can reduce the security of schemes that use it, an...
We investigate, in a concrete security setting, several alternate characterizations of pseudorandom ...
Abstract. In CRYPTO 2003, Halevi and Rogaway proposed CMC, a tweakable enciphering scheme (TES) base...
Abstract. The domain of lightweight cryptography focuses on crypto-graphic algorithms for extremely ...
Observing the growing popularity of random permutation (RP)-based designs (e.g, Sponge), Bart Mennin...
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a no...
Abstract. Recent advances in block-cipher theory deliver security analyses in models where one or mo...
In this work we advance the study of leakage-resilient Authenticated Encryption with Associated Data...
This paper fills an important foundational gap with the first proofs, under standard assumptions and...
A Rugged Pseudorandom Permutation (RPRP) is a variable-input-length tweakable cipher satisfying a se...
Abstract. We present PEP, which is a new construction of a tweak-able strong pseudo-random permutati...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
The theory of designing block ciphers is mature, having seen significant progress since the early 19...
Leakage-resilient cryptosystems aim to maintain security in situations where their implementation le...
We propose definitions and constructions of authenticated encryption (AE) schemes that offer securit...
We argue that the invertibility of a block cipher can reduce the security of schemes that use it, an...
We investigate, in a concrete security setting, several alternate characterizations of pseudorandom ...
Abstract. In CRYPTO 2003, Halevi and Rogaway proposed CMC, a tweakable enciphering scheme (TES) base...
Abstract. The domain of lightweight cryptography focuses on crypto-graphic algorithms for extremely ...
Observing the growing popularity of random permutation (RP)-based designs (e.g, Sponge), Bart Mennin...
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a no...
Abstract. Recent advances in block-cipher theory deliver security analyses in models where one or mo...
In this work we advance the study of leakage-resilient Authenticated Encryption with Associated Data...
This paper fills an important foundational gap with the first proofs, under standard assumptions and...