We prove that a balanced 8-round Feistel network is indifferentiable from a random permutation. This result comes on the heels of (and is part of the same body of work as) a 10-round indifferentiability result for Feistel network recently announced by the same team of authors. The current 8-round simulator achieves similar security, query complexity and runtime as the 10-round simulator and is not significantly more involved. The security of our simulator is also slightly better than the security of the 14-round simulator of Holenstein et al. for essentially the same runtime and query complexity
Let A be a Feistel scheme with 5 rounds from 2n bits to 2n bits. In the present paper we show that f...
In [3] M. Luby and C. Rackoff have proved that 3-round random Feistel schemes are secure against all...
Let A be a Feistel scheme with 5 rounds from 2n bits to 2n bits. In the present paper we show that f...
We prove that a (balanced) 10-round Feistel network is indifferentiable from a random permutation. I...
Abstract. We prove that a balanced 8-round Feistel network is indifferentiable from a random per-mut...
We revisit the question of constructing an ideal cipher from a random oracle. Coron et al.~(Journal ...
Holenstein et al. (STOC 2011) have shown that the Feistel construction with fourteen rounds and publ...
Abstract. Holenstein et al. (STOC 2011) have shown that the Feistel construction with fourteen round...
We consider the cryptographic problem of constructing an invertible random permutation from a public...
This paper provides the first provably secure construction of an invertible random permutation (and ...
In this thesis we consider different problems related to provable security and indifferentiability f...
International audienceWe study Authenticated Encryption with Associated Data (AEAD) from the viewpoi...
Block ciphers are an essential ingredient of modern cryptography. They are widely used as building ...
Abstract. Feistel constructions have been shown to be indierentiable from random permutations at STO...
peer reviewedWe describe the first domain extender for ideal ciphers, i.e. we show a construction th...
Let A be a Feistel scheme with 5 rounds from 2n bits to 2n bits. In the present paper we show that f...
In [3] M. Luby and C. Rackoff have proved that 3-round random Feistel schemes are secure against all...
Let A be a Feistel scheme with 5 rounds from 2n bits to 2n bits. In the present paper we show that f...
We prove that a (balanced) 10-round Feistel network is indifferentiable from a random permutation. I...
Abstract. We prove that a balanced 8-round Feistel network is indifferentiable from a random per-mut...
We revisit the question of constructing an ideal cipher from a random oracle. Coron et al.~(Journal ...
Holenstein et al. (STOC 2011) have shown that the Feistel construction with fourteen rounds and publ...
Abstract. Holenstein et al. (STOC 2011) have shown that the Feistel construction with fourteen round...
We consider the cryptographic problem of constructing an invertible random permutation from a public...
This paper provides the first provably secure construction of an invertible random permutation (and ...
In this thesis we consider different problems related to provable security and indifferentiability f...
International audienceWe study Authenticated Encryption with Associated Data (AEAD) from the viewpoi...
Block ciphers are an essential ingredient of modern cryptography. They are widely used as building ...
Abstract. Feistel constructions have been shown to be indierentiable from random permutations at STO...
peer reviewedWe describe the first domain extender for ideal ciphers, i.e. we show a construction th...
Let A be a Feistel scheme with 5 rounds from 2n bits to 2n bits. In the present paper we show that f...
In [3] M. Luby and C. Rackoff have proved that 3-round random Feistel schemes are secure against all...
Let A be a Feistel scheme with 5 rounds from 2n bits to 2n bits. In the present paper we show that f...