Beyond-Birthday-Bound Secure Cryptographic Permutations from Ideal Ciphers with Long Keys.
Ryota NakamichiTetsu IwataPublished in: IACR Trans. Symmetric Cryptol. (2020)
Keyphrases
- stream cipher
- secret key
- hash functions
- smart card
- block cipher
- advanced encryption standard
- security protocols
- encryption scheme
- chosen plaintext attack
- key management
- secure communication
- ciphertext
- private key
- public key
- pseudorandom
- security analysis
- upper bound
- authentication scheme
- encryption decryption
- digital signature
- lower bound
- authentication protocol
- diffie hellman
- key agreement
- security properties
- key distribution
- key establishment
- signature scheme
- encryption key
- similarity search
- security level
- chosen plaintext
- s box
- cryptographic protocols
- security mechanisms
- cryptographic algorithms
- high security
- security services
- standard model
- homomorphic encryption
- error bounds
- probability distribution