From indifferentiability to constructive cryptography (and back)

U Maurer, R Renner - … of Cryptography: 14th International Conference …, 2016 - Springer
… in cryptography (and more generally in computer science), … both “abstract cryptography” and
“constructive cryptography” have … R into another resource which we denote by \(\alpha ^i R\), …

Theory of Cryptography

M Hirt, A Smith - Springer
Maurer and Renner accepted the award on his behalf. The … For running the conference
itself, we are very grateful to … , both “abstract cryptography” and “constructive cryptography” …

[BOOK][B] Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I

M Hirt, A Smith - 2016 - books.google.com
Maurer and Renner accepted the award on his behalf. The … , both “abstract cryptography
and “constructive cryptography” have … i transforms a resource R into another resource which we …

A definitional framework for functional encryption

C Matt, U Maurer - … Computer Security Foundations Symposium, 2015 - ieeexplore.ieee.org
… for public-key encryption with honest A and B where we want … SECA,B from authenticated
channels AUTB,A and AUTA,B in … with r, πRO B outputs the bitwise XOR of r and the second

Per-session security: Password-based cryptography revisited

G Demay, P Gaži, U Maurer, B Tackmann - … Symposium on Research in …, 2017 - Springer
AbstractSecond, we apply our approach to revisit the analysis of password-based message
… by the following notion of construction, as introduced by Maurer and Renner [19, 20]. To be …

A constructive perspective on key encapsulation

S Coretti, U Maurer, B Tackmann - Number Theory and Cryptography …, 2013 - Springer
cryptography paradigm by Maurer and Renner (ICS 2011). The … This concept, which we refer
to as abstract systems, captures … one connects to I.1 of R and the second one connects to I.2 …

Constructing confidential channels from authenticated channels—public-key encryption revisited

S Coretti, U Maurer, B Tackmann - … 2013: 19th International Conference …, 2013 - Springer
Abstract. The security of public-key … I-interface of [R, S] has two inside subinterfaces, denoted
by in.1 and in.2, where the first one connects to I.1 of R and the second one connects to I.2 …

The one-time pad revisited

C Matt, U Maurer - 2013 IEEE International Symposium on …, 2013 - ieeexplore.ieee.org
Abstract—The one-time pad, the mother of all encryption … In this paper, we focus on
another, completely different aspect … We use the constructive cryptography framework to make …

Augmented secure channels and the goal of the TLS 1.3 record layer

…, C Matt, U Maurer, P Rogaway, B Tackmann - … International Conference …, 2015 - Springer
Abstract Motivated by the wide adoption of authenticated encryption and TLS, we suggest a
… The insecure channel \(\mathbf {IC}\) allows messages to be input repeatedly at interface \(\…

Resource-restricted indifferentiability

G Demay, P Gaži, M Hirt, U Maurer - … and Applications of Cryptographic …, 2013 - Springer
… The simulator is modeled as a PPT algorithm, guaranteeing that the … As another consequence,
we also obtain the irreducibility of … of abstract cryptography (AC) of Maurer and Renner. …