2018
DOI: 10.1007/978-3-030-03807-6_1
|View full text |Cite
|
Sign up to set email alerts
|

Provable Time-Memory Trade-Offs: Symmetric Cryptography Against Memory-Bounded Adversaries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 34 publications
0
4
0
Order By: Relevance
“…We state and prove a bound on Adv 1LD-d in Section 4.2. Our proof applies the same reduction technique as Tessaro and Thiruvengadam [31], we are verifying that it works quantumly as well.…”
Section: Security Resultsmentioning
confidence: 56%
See 2 more Smart Citations
“…We state and prove a bound on Adv 1LD-d in Section 4.2. Our proof applies the same reduction technique as Tessaro and Thiruvengadam [31], we are verifying that it works quantumly as well.…”
Section: Security Resultsmentioning
confidence: 56%
“…This is a worst-case decision problem measuring how well an algorithm can distinguish between a pair of lists with zero or exactly one element in common, which can be viewed as a decision version of the claw-finding problem. This reduction technique was originally used by Tessaro and Thiruvengadam [31] to establish a classical time-memory trade-off for the security of double encryption. We observe that their technique works for a quantum adversary.…”
Section: Double Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the field of cryptography, several previous works investigated the security of cryptographic primitives against a space-bounded adversary whose input is given as a data stream composed of a sequence of elements that can be read only once (cf., [ 7 , 20 ]). More recently, Thiruvengadam and Tessaro initiated the study of the security of modes of operation against space-bounded adversaries [ 23 ]. Jaeger and Tessaro’s work [ 15 ], as well as this paper, continue the line of research on streaming algorithms in cryptography.…”
Section: Introductionmentioning
confidence: 99%