The Experts below are selected from a list of 69 Experts worldwide ranked by ideXlab platform
Yannick Seurin - One of the best experts on this subject based on the ideXlab platform.
-
Selected Areas in Cryptography - Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results
Selected Areas in Cryptography -- SAC 2014, 2014Co-Authors: Benoît Cogliati, Jacques Patarin, Yannick SeurinAbstract:Security amplification results for block ciphers typically state that cascading (i.e., composing with independent keys) two (or more) block ciphers yields a new block cipher that offers better security against some class of adversaries and/or that resists Stronger adversaries than each of its components. One of the most important results in this respect is the so-called “two weak make one Strong” Theorem, first established up to logarithmic terms by Maurer and Pietrzak (TCC 2004), and later optimally tightened by Maurer, Pietrzak, and Renner (CRYPTO 2007), which states that, in the information-theoretic setting, cascading \(F\) and \(G^{-1}\), where \(F\) and \(G\) are respectively \((q,\varepsilon _F)\)-secure and \((q,\varepsilon _G)\)-secure against non-adaptive chosen-plaintext (NCPA) attacks, yields a block cipher which is \((q,\varepsilon _F+\varepsilon _G)\)-secure against adaptive chosen-plaintext and ciphertext (CCA) attacks. The first contribution of this work is a surprisingly simple proof of this Theorem, relying on Patarin’s H-coefficient method. We then extend our new proof to obtain new results (still in the information-theoretic setting). In particular, we prove a new composition Theorem (which can be seen as the generalization of the “two weak make one Strong” Theorem to the composition of \(n>2\) block ciphers) which provides both amplification of the advantage and strengthening of the distinguisher’s class in some optimal way (indeed we prove that our new composition Theorem is tight up to some constant).
-
Security Amplification for the Composition of Block Ciphers Simpler Proofs and New Results
2014Co-Authors: Benoît Cogliati, Jacques Patarin, Yannick SeurinAbstract:Security amplification results for block ciphers typically state that cascading (i.e., composing with independent keys) two (or more) block ciphers yields a new block cipher that offers better security against some class of adversaries and/or that resists Stronger adversaries than each of its components. One of the most important results in this respect is the so-called "two weak make one Strong" Theorem, first established up to logarithmic terms by Maurer and Pietrzak (TCC 2004), and later optimally tightened by Maurer, Pietrzak, and Renner (CRYPTO 2007), which states that, in the information-theoretic setting, cascading F and G(-1), where F and G are respectively (q, epsilon F)-secure and (q, epsilon G)-secure against non-adaptive chosen-plaintext (NCPA) attacks, yields a block cipher which is (q, epsilon F + epsilon G)-secure against adaptive chosen-plaintext and ciphertext (CCA) attacks. The first contribution of this work is a surprisingly simple proof of this Theorem, relying on Patarin's H-coefficient method. We then extend our new proof to obtain new results (still in the information-theoretic setting). In particular, we prove a new composition Theorem (which can be seen as the generalization of the "two weak make one Strong" Theorem to the composition of n > 2 block ciphers) which provides both amplification of the advantage and strengthening of the distinguisher's class in some optimal way (indeed we prove that our new composition Theorem is tight up to some constant).
Benoît Cogliati - One of the best experts on this subject based on the ideXlab platform.
-
Selected Areas in Cryptography - Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results
Selected Areas in Cryptography -- SAC 2014, 2014Co-Authors: Benoît Cogliati, Jacques Patarin, Yannick SeurinAbstract:Security amplification results for block ciphers typically state that cascading (i.e., composing with independent keys) two (or more) block ciphers yields a new block cipher that offers better security against some class of adversaries and/or that resists Stronger adversaries than each of its components. One of the most important results in this respect is the so-called “two weak make one Strong” Theorem, first established up to logarithmic terms by Maurer and Pietrzak (TCC 2004), and later optimally tightened by Maurer, Pietrzak, and Renner (CRYPTO 2007), which states that, in the information-theoretic setting, cascading \(F\) and \(G^{-1}\), where \(F\) and \(G\) are respectively \((q,\varepsilon _F)\)-secure and \((q,\varepsilon _G)\)-secure against non-adaptive chosen-plaintext (NCPA) attacks, yields a block cipher which is \((q,\varepsilon _F+\varepsilon _G)\)-secure against adaptive chosen-plaintext and ciphertext (CCA) attacks. The first contribution of this work is a surprisingly simple proof of this Theorem, relying on Patarin’s H-coefficient method. We then extend our new proof to obtain new results (still in the information-theoretic setting). In particular, we prove a new composition Theorem (which can be seen as the generalization of the “two weak make one Strong” Theorem to the composition of \(n>2\) block ciphers) which provides both amplification of the advantage and strengthening of the distinguisher’s class in some optimal way (indeed we prove that our new composition Theorem is tight up to some constant).
-
Security Amplification for the Composition of Block Ciphers Simpler Proofs and New Results
2014Co-Authors: Benoît Cogliati, Jacques Patarin, Yannick SeurinAbstract:Security amplification results for block ciphers typically state that cascading (i.e., composing with independent keys) two (or more) block ciphers yields a new block cipher that offers better security against some class of adversaries and/or that resists Stronger adversaries than each of its components. One of the most important results in this respect is the so-called "two weak make one Strong" Theorem, first established up to logarithmic terms by Maurer and Pietrzak (TCC 2004), and later optimally tightened by Maurer, Pietrzak, and Renner (CRYPTO 2007), which states that, in the information-theoretic setting, cascading F and G(-1), where F and G are respectively (q, epsilon F)-secure and (q, epsilon G)-secure against non-adaptive chosen-plaintext (NCPA) attacks, yields a block cipher which is (q, epsilon F + epsilon G)-secure against adaptive chosen-plaintext and ciphertext (CCA) attacks. The first contribution of this work is a surprisingly simple proof of this Theorem, relying on Patarin's H-coefficient method. We then extend our new proof to obtain new results (still in the information-theoretic setting). In particular, we prove a new composition Theorem (which can be seen as the generalization of the "two weak make one Strong" Theorem to the composition of n > 2 block ciphers) which provides both amplification of the advantage and strengthening of the distinguisher's class in some optimal way (indeed we prove that our new composition Theorem is tight up to some constant).
Jacques Patarin - One of the best experts on this subject based on the ideXlab platform.
-
Selected Areas in Cryptography - Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results
Selected Areas in Cryptography -- SAC 2014, 2014Co-Authors: Benoît Cogliati, Jacques Patarin, Yannick SeurinAbstract:Security amplification results for block ciphers typically state that cascading (i.e., composing with independent keys) two (or more) block ciphers yields a new block cipher that offers better security against some class of adversaries and/or that resists Stronger adversaries than each of its components. One of the most important results in this respect is the so-called “two weak make one Strong” Theorem, first established up to logarithmic terms by Maurer and Pietrzak (TCC 2004), and later optimally tightened by Maurer, Pietrzak, and Renner (CRYPTO 2007), which states that, in the information-theoretic setting, cascading \(F\) and \(G^{-1}\), where \(F\) and \(G\) are respectively \((q,\varepsilon _F)\)-secure and \((q,\varepsilon _G)\)-secure against non-adaptive chosen-plaintext (NCPA) attacks, yields a block cipher which is \((q,\varepsilon _F+\varepsilon _G)\)-secure against adaptive chosen-plaintext and ciphertext (CCA) attacks. The first contribution of this work is a surprisingly simple proof of this Theorem, relying on Patarin’s H-coefficient method. We then extend our new proof to obtain new results (still in the information-theoretic setting). In particular, we prove a new composition Theorem (which can be seen as the generalization of the “two weak make one Strong” Theorem to the composition of \(n>2\) block ciphers) which provides both amplification of the advantage and strengthening of the distinguisher’s class in some optimal way (indeed we prove that our new composition Theorem is tight up to some constant).
-
Security Amplification for the Composition of Block Ciphers Simpler Proofs and New Results
2014Co-Authors: Benoît Cogliati, Jacques Patarin, Yannick SeurinAbstract:Security amplification results for block ciphers typically state that cascading (i.e., composing with independent keys) two (or more) block ciphers yields a new block cipher that offers better security against some class of adversaries and/or that resists Stronger adversaries than each of its components. One of the most important results in this respect is the so-called "two weak make one Strong" Theorem, first established up to logarithmic terms by Maurer and Pietrzak (TCC 2004), and later optimally tightened by Maurer, Pietrzak, and Renner (CRYPTO 2007), which states that, in the information-theoretic setting, cascading F and G(-1), where F and G are respectively (q, epsilon F)-secure and (q, epsilon G)-secure against non-adaptive chosen-plaintext (NCPA) attacks, yields a block cipher which is (q, epsilon F + epsilon G)-secure against adaptive chosen-plaintext and ciphertext (CCA) attacks. The first contribution of this work is a surprisingly simple proof of this Theorem, relying on Patarin's H-coefficient method. We then extend our new proof to obtain new results (still in the information-theoretic setting). In particular, we prove a new composition Theorem (which can be seen as the generalization of the "two weak make one Strong" Theorem to the composition of n > 2 block ciphers) which provides both amplification of the advantage and strengthening of the distinguisher's class in some optimal way (indeed we prove that our new composition Theorem is tight up to some constant).
Shigeru Kuroda - One of the best experts on this subject based on the ideXlab platform.
-
On the Karaś type Theorems for the multidegrees of polynomial automorphisms
Journal of Algebra, 2015Co-Authors: Shigeru KurodaAbstract:Abstract To solve Nagata's conjecture, Shestakov–Umirbaev constructed a theory for deciding wildness of polynomial automorphisms in three variables. Recently, Karaś and others studied multidegrees of polynomial automorphisms as an application of this theory. They give various necessary conditions for triples of positive integers to be multidegrees of tame automorphisms in three variables. In this paper, we prove a Strong Theorem unifying and generalizing these results using the generalized Shestakov–Umirbaev theory.
-
On the Kara\'s type Theorems for the multidegrees of polynomial automorphisms
arXiv: Commutative Algebra, 2013Co-Authors: Shigeru KurodaAbstract:To solve Nagata's conjecture, Shestakov-Umirbaev constructed a theory for deciding wildness of polynomial automorphisms in three variables. Recently, Kara\'s and others study multidegrees of polynomial automorphisms as an application of this theory. They give various necessary conditions for triples of positive integers to be multidegrees of tame automorphisms in three variables. In this paper, we prove a Strong Theorem unifying these results using the generalized Shestakov-Umirbaev theory.
Brad Shelton - One of the best experts on this subject based on the ideXlab platform.
-
K2 factors of Koszul algebras and applications to face rings
Journal of Algebra, 2012Co-Authors: Andrew Conner, Brad SheltonAbstract:Generalizing the notion of a Koszul algebra, a graded k-algebra A is K2 if its Yoneda algebra ExtA(k,k) is generated as an algebra in cohomology degrees 1 and 2. We prove a Strong Theorem about K2 factor algebras of Koszul algebras and use that Theorem to show the Stanley–Reisner face ring of a simplicial complex Δ is K2 whenever the Alexander dual simplicial complex Δ⁎ is (sequentially) Cohen–Macaulay.
-
$\mathcal K_2$ factors of Koszul algebras and applications to face rings
arXiv: Rings and Algebras, 2011Co-Authors: Andrew Conner, Brad SheltonAbstract:Generalizing the notion of a Koszul algebra, a graded k-algebra A is K2 if its Yoneda algebra is generated as an algebra in cohomology degrees 1 and 2. We prove a Strong Theorem about K2 factor algebras of Koszul algebras and use that Theorem to show the Stanley-Reisner face ring of a simplicial complex is K2 whenever the Alexander dual simplicial complex is (sequentially) Cohen-Macaulay.