An efficient quantum collision search algorithm and implications on symmetric cryptography

A Chailloux, M Naya-Plasencia… - Advances in Cryptology …, 2017 - Springer
The cryptographic community has widely acknowledged that the emergence of large
quantum computers will pose a threat to most current public-key cryptography. Primitives …

The random oracle model: a twenty-year retrospective

N Koblitz, AJ Menezes - Designs, Codes and Cryptography, 2015 - Springer
It has been roughly two decades since the random oracle model for reductionist security
arguments was introduced and one decade since we first discussed the controversy that had …

An efficient lattice-based signature scheme with provably secure instantiation

S Akleylek, N Bindel, J Buchmann, J Krämer… - Progress in Cryptology …, 2016 - Springer
In view of the expected progress in cryptanalysis it is important to find alternatives for
currently used signature schemes such as RSA and ECDSA. The most promising lattice …

A note on quantum security for post-quantum cryptography

F Song - International Workshop on Post-Quantum …, 2014 - Springer
Shor's quantum factoring algorithm and a few other efficient quantum algorithms break many
classical crypto-systems. In response, people proposed post-quantum cryptography based …

Multi-key security: The Even-Mansour construction revisited

N Mouha, A Luykx - Advances in Cryptology--CRYPTO 2015: 35th Annual …, 2015 - Springer
Abstract At ASIACRYPT 1991, Even and Mansour introduced a block cipher construction
based on a single permutation. Their construction has since been lauded for its simplicity …

Full-state keyed duplex with built-in multi-user support

J Daemen, B Mennink, G Van Assche - … on the Theory and Applications of …, 2017 - Springer
The keyed duplex construction was introduced by Bertoni et al.(SAC 2011) and recently
generalized to full-state absorption by Mennink et al.(ASIACRYPT 2015). We present a …

Boosting authenticated encryption robustness with minimal modifications

T Ashur, O Dunkelman, A Luykx - … , Santa Barbara, CA, USA, August 20 …, 2017 - Springer
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data
confidentiality and authenticity in the symmetric-key setting have existed for well over a …

Optimal security proofs for full domain hash, revisited

SA Kakvi, E Kiltz - Advances in Cryptology–EUROCRYPT 2012: 31st …, 2012 - Springer
Abstract RSA Full Domain Hash (RSA-FDH) is a digital signature scheme, secure again
chosen message attacks in the random oracle model. The best known security reduction …

Critical perspectives on provable security: Fifteen years of" another look" papers

N Koblitz, A Menezes - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Contents Page 1 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …

Analyzing multi-key security degradation

A Luykx, B Mennink, KG Paterson - … on the Theory and Applications of …, 2017 - Springer
The multi-key, or multi-user, setting challenges cryptographic algorithms to maintain high
levels of security when used with many different keys, by many different users. Its …