See also DBLP.
Journal | Title | Available files |
---|---|---|
IACR ToSC |
Subverting Telegram's End-to-End Encryption B. Cogliati, J. Ethan, A. Jha IACR Transactions on Symmetric Cryptology, 2023. |
[Full version] |
IACR ToSC |
CTET+: A Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom Permutation B. Cogliati, J. Ethan, V. Lallemand, B. Lee, J. Lee, M. Minier IACR Transactions on Symmetric Cryptology, 2021. |
[Full version] |
DCC |
Tweaking a Block Cipher: Multi-user Beyond-Birthday-Bound Security in the Standard Model B. Cogliati Designs, Codes and Cryptography, 2018. |
[DOI] |
DCC |
Analysis of the Single-Permutation Encrypted Davies-Meyer Construction B. Cogliati and Y. Seurin Designs, Codes and Cryptography, 2018. |
[DOI] |
IACR ToSC / FSE 2018 |
New Constructions of MACs from (Tweakable) Block Ciphers B. Cogliati and Y. Seurin and J. Lee IACR Trans. Symmetric Cryptol. 2017(2) |
[Full version], [slides (ESC2017)] |
Conference | Title | Available files |
---|---|---|
ASIACRYPT 2023 |
On Quantum Secure Compressing Pseudorandom Functions R. Bhaumik, B. Cogliati, J. Ethan, A. Jha |
[Full version] |
Eurocrypt 2023 |
Proof of Mirror Theory for a Wide Range of $\xi _{\max }$ B. Cogliati, A. Dutta, M. Nandi, J. Patarin, A. Saha |
[Full version] |
ASIACRYPT 2020 |
How to Build Optimally Secure PRFs Using Block Ciphers B. Cogliati, A. Jha, M. Nandi |
[Full version] |
CRYPTO 2018 |
Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks B. Cogliati, Y. Dodis, J. Katz, J. Lee, J. Steinberger, A. Thiruvengadam, and Z. Zhang. Note: this paper is a merge of [CL18] and [DKS+17]. |
|
CRYPTO 2016 |
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC B. Cogliati and Y. Seurin |
[Full version] |
FSE 2016 |
Strengthening the Known-Key Security Notion for Block Ciphers B. Cogliati and Y. Seurin |
[Full version] |
ASIACRYPT 2015 |
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing B. Cogliati and Y. Seurin |
[Full version] |
CRYPTO 2015 |
Tweaking Even-Mansour Ciphers B. Cogliati and R. Lampe and Y. Seurin |
[Full version] |
EUROCRYPT 2015 |
On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks B. Cogliati and Y. Seurin |
[Full version], [slides] |
SAC 2014 |
Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results B. Cogliati, J. Patarin, and Y. Seurin |
[DOI], [slides] |
FSE 2014 |
The Indistinguishability of the XOR of k Permutations B. Cogliati and R. Lampe and J. Patarin |
[Full version], [slides] |