From indifferentiability to constructive cryptography (and back)
… in cryptography (and more generally in computer science), … both “abstract cryptography” and
“constructive cryptography” have … R into another resource which we denote by \(\alpha ^i R\), …
“constructive cryptography” have … R into another resource which we denote by \(\alpha ^i R\), …
Theory of Cryptography
M Hirt, A Smith - Springer
… Maurer and Renner accepted the award on his behalf. The … For running the conference
itself, we are very grateful to … , both “abstract cryptography” and “constructive cryptography” …
itself, we are very grateful to … , both “abstract cryptography” and “constructive cryptography” …
[BOOK][B] Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I
M Hirt, A Smith - 2016 - books.google.com
… Maurer and Renner accepted the award on his behalf. The … , both “abstract cryptography”
and “constructive cryptography” have … i transforms a resource R into another resource which we …
and “constructive cryptography” have … i transforms a resource R into another resource which we …
A definitional framework for functional encryption
… for public-key encryption with honest A and B where we want … SECA,B from authenticated
channels AUTB,A and AUTA,B in … with r, πRO B outputs the bitwise XOR of r and the second …
channels AUTB,A and AUTA,B in … with r, πRO B outputs the bitwise XOR of r and the second …
Per-session security: Password-based cryptography revisited
… Abstract … Second, we apply our approach to revisit the analysis of password-based message
… by the following notion of construction, as introduced by Maurer and Renner [19, 20]. To be …
… by the following notion of construction, as introduced by Maurer and Renner [19, 20]. To be …
A constructive perspective on key encapsulation
… cryptography paradigm by Maurer and Renner (ICS 2011). The … This concept, which we refer
to as abstract systems, captures … one connects to I.1 of R and the second one connects to I.2 …
to as abstract systems, captures … one connects to I.1 of R and the second one connects to I.2 …
Constructing confidential channels from authenticated channels—public-key encryption revisited
… Abstract. The security of public-key … I-interface of [R, S] has two inside subinterfaces, denoted
by in.1 and in.2, where the first one connects to I.1 of R and the second one connects to I.2 …
by in.1 and in.2, where the first one connects to I.1 of R and the second one connects to I.2 …
The one-time pad revisited
… Abstract—The one-time pad, the mother of all encryption … In this paper, we focus on
another, completely different aspect … We use the constructive cryptography framework to make …
another, completely different aspect … We use the constructive cryptography framework to make …
Augmented secure channels and the goal of the TLS 1.3 record layer
… Abstract Motivated by the wide adoption of authenticated encryption and TLS, we suggest a
… The insecure channel \(\mathbf {IC}\) allows messages to be input repeatedly at interface \(\…
… The insecure channel \(\mathbf {IC}\) allows messages to be input repeatedly at interface \(\…
Resource-restricted indifferentiability
… The simulator is modeled as a PPT algorithm, guaranteeing that the … As another consequence,
we also obtain the irreducibility of … of abstract cryptography (AC) of Maurer and Renner. …
we also obtain the irreducibility of … of abstract cryptography (AC) of Maurer and Renner. …