搜索结果: 1-5 共查到“Related-Key Security”相关记录5条 . 查询时间(0.093 秒)
Human-readable Proof of the Related-Key Security of AES-128
AES related-key differential attack security proof
2016/1/27
The related-key model is now considered an important scenario for block cipher security and many schemes were broken in this model, even AES-192 and AES-256. Recently were introduced efficient compute...
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
Related-Key Security Pseudorandom Functions
2016/1/9
Related-key attacks (RKAs) concern the security of cryptographic primitives in the situation where the key can be manipulated by the adversary. In the RKA setting, the adversary's power is expressed t...
The Related-Key Security of Iterated Even-Mansour Ciphers
Even–Mansour related-key attack public permutation
2016/1/5
The simplicity and widespread use of blockciphers based on the iterated Even–Mansour (EM)
construction has sparked recent interest in the theoretical study of their security. Previous work has
estab...
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security
Related-key attacks non-malleable key derivation one-time lossy filter
2016/1/5
Related-Key Attacks (RKAs) allow an adversary to observe the outcomes of a cryptographic
primitive under not only its original secret key e.g., s, but also a sequence of modified keys φ(s), where φ
...
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security
Related-Key Security Pseudorandom Functions
2015/12/29
In this work, we provide a new algebraic framework for pseudorandom functions which encompasses many of the existing algebraic constructions, including the ones by Naor and Reingold (FOCS'97), by Lewk...