scholarly journals Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs

Author(s):  
Eric Miles ◽  
Emanuele Viola
2015 ◽  
Vol 62 (6) ◽  
pp. 1-29 ◽  
Author(s):  
Eric Miles ◽  
Emanuele Viola

Networks ◽  
1999 ◽  
Vol 33 (4) ◽  
pp. 261-267 ◽  
Author(s):  
Gerard J. Chang ◽  
Frank K. Hwang ◽  
Li-Da Tong
Keyword(s):  

2009 ◽  
Vol 23 (3) ◽  
pp. 1612-1645
Author(s):  
Juraj Hromkovič ◽  
PrzemysŁawa Kanarek ◽  
Ralf Klasing ◽  
Krzysztof Loryś ◽  
Walter Unger ◽  
...  

2020 ◽  
pp. 165-186
Author(s):  
William Easttom
Keyword(s):  

Author(s):  
Kazuhiko Minematsu ◽  
Tetsu Iwata

At CT-RSA 2017, List and Nandi proposed two variable input length pseudorandom functions (VI-PRFs) called PMACx and PMAC2x, and a deterministic authenticated encryption scheme called SIVx. These schemes use a tweakable block cipher (TBC) as the underlying primitive, and are provably secure up to the query complexity of 2n, where n denotes the block length of the TBC. In this paper, we falsify the provable security claims by presenting concrete attacks. We show that with the query complexity of O(2n/2), i.e., with the birthday complexity, PMACx, PMAC2x, and SIVx are all insecure.


Author(s):  
Martin R. Albrecht ◽  
Alex Davidson ◽  
Amit Deo ◽  
Nigel P. Smart

Author(s):  
R. Pöschel ◽  
F. Wächter ◽  
F. Börner
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document