Symbolic Synthesis of Indifferentiability Attacks
Abstract
Supplementary Material
- Download
- 47.72 MB
References
Index Terms
- Symbolic Synthesis of Indifferentiability Attacks
Recommendations
A synthetic indifferentiability analysis of some block-cipher-based hash functions
At ASIACRYPT'06 , Chang et al. analyzed the indifferentiability of some popular hash functions based on block ciphers, namely, the twenty collision resistant PGV, the MDC2 and the PBGV hash functions, etc. In particular, two indifferentiable attacks ...
Improved indifferentiability security bound for the JH mode
Indifferentiability security of a hash mode of operation guarantees the mode's resistance against all generic attacks. It is also useful to establish the security of protocols that use hash functions as random functions. The JH hash function was one of ...
Sequential Indifferentiability of Confusion-Diffusion Networks
Progress in Cryptology – INDOCRYPT 2021AbstractA large proportion of modern symmetric cryptographic building blocks are designed using the Substitution-Permutation Networks (SPNs), or more generally, Shannon’s confusion-diffusion paradigm. To justify its theoretical soundness, Dodis et al. (...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Yuji Suga,
- Kouichi Sakurai,
- Program Chairs:
- Xuhua Ding,
- Kazue Sako
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 254Total Downloads
- Downloads (Last 12 months)120
- Downloads (Last 6 weeks)24
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in