On the Resilience of Even-Mansour to Invariant Permutations View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2021-02-23

AUTHORS

Bart Mennink, Samuel Neves

ABSTRACT

Symmetric cryptographic primitives are often exposed to invariances: deterministic relations between plaintexts and ciphertexts that propagate through the primitive. Recent invariant subspace attacks have shown that these can be a serious issue. One way to mitigate invariant subspace attacks is at the primitive level, namely by proper use of round constants (Beierle et al., CRYPTO 2017). In this work, we investigate how to thwart invariance exploitation at the mode level, namely by assuring that a mode never evaluates its underlying primitive under any invariance. We first formalize the use of invariant cryptographic permutations from a security perspective, and analyze the Even-Mansour block cipher construction. We further demonstrate how the model composes, and apply it to the keyed sponge construction. The security analyses exactly pinpoint how the presence of linear invariances affects the bounds compared with analyses in the random permutation model. As such, they give an exact indication how invariances can be exploited. From a practical side, we apply the derived security bounds to the case where the Even-Mansour construction is instantiated with the 512-bit ChaCha permutation, and derive a distinguishing attack against Even-Mansour-ChaCha in 2128\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{128}$$\end{document} queries, faster than the birthday bound. Comparable results are derived for instantiation using the 200-bit Keccak permutation without round constants (attack in 250\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{50}$$\end{document} queries), the 1024-bit CubeHash permutation (attack in 2256\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{256}$$\end{document} queries), and the 384-bit Gimli permutation without round constants (attack in 296\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{96}$$\end{document} queries). The attacks do not invalidate the security of the permutations themselves, but rather they demonstrate the tightness of our bounds and confirm that care should be taken when employing a cryptographic primitive that has nontrivial linear invariances. More... »

PAGES

859-893

References to SciGraph publications

  • 2014. Tight Security Bounds for Key-Alternating Ciphers in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2014
  • 2005. Complementation-Like and Cyclic Properties of AES Round Functions in ADVANCED ENCRYPTION STANDARD – AES
  • 2011. A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack in ADVANCES IN CRYPTOLOGY – CRYPTO 2011
  • 2015-08-01. The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC in ADVANCES IN CRYPTOLOGY -- CRYPTO 2015
  • 2014-05-03. Almost universal forgery attacks on AES-based MAC’s in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2011. The Software Performance of Authenticated-Encryption Modes in FAST SOFTWARE ENCRYPTION
  • 2015-08-01. The Iterated Random Permutation Problem with Applications to Cascade Encryption in ADVANCES IN CRYPTOLOGY -- CRYPTO 2015
  • 2014. Analysis of BLAKE2 in TOPICS IN CRYPTOLOGY – CT-RSA 2014
  • 2002-11-08. In How Many Ways Can You Write Rijndael? in ADVANCES IN CRYPTOLOGY — ASIACRYPT 2002
  • 2015-08-01. Multi-key Security: The Even-Mansour Construction Revisited in ADVANCES IN CRYPTOLOGY -- CRYPTO 2015
  • 2010. Advances in Cryptology – CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings in NONE
  • 2016-07-20. New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length in FAST SOFTWARE ENCRYPTION
  • 2002. The Design of Rijndael, AES — The Advanced Encryption Standard in NONE
  • 2004. The Security and Performance of the Galois/Counter Mode (GCM) of Operation in PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004
  • 2017-07-29. Proving Resistance Against Invariant Attacks: How to Choose the Round Constants in ADVANCES IN CRYPTOLOGY – CRYPTO 2017
  • 2018-10-27. Block Cipher Invariants as Eigenvectors of Correlation Matrices in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2018
  • 2017-11-18. Full-State Keyed Duplex with Built-In Multi-user Support in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2017
  • 2011. The PHOTON Family of Lightweight Hash Functions in ADVANCES IN CRYPTOLOGY – CRYPTO 2011
  • 2017-03-04. Connecting tweakable and multi-key blockcipher security in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2013. BLAKE2: Simpler, Smaller, Fast as MD5 in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2010. Another Look at Complementation Properties in FAST SOFTWARE ENCRYPTION
  • 1993. A construction of a cipher from a single pseudorandom permutation in ADVANCES IN CRYPTOLOGY — ASIACRYPT '91
  • 2013-06-20. Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures in DESIGNS, CODES AND CRYPTOGRAPHY
  • 1983. Some Regular Properties of the ‘Data Encryption Standard’ Algorithm in ADVANCES IN CRYPTOLOGY
  • 2015-12-30. Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2015
  • 2012. Advances in Cryptology – EUROCRYPT 2012, 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings in NONE
  • 2015-04-14. A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro in ADVANCES IN CRYPTOLOGY -- EUROCRYPT 2015
  • 2014. Tweaks and Keys for Block Ciphers: The TWEAKEY Framework in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2014
  • 2010-11-03. A Practical Attack on KeeLoq in JOURNAL OF CRYPTOLOGY
  • 2001. Bitslice Ciphers and Power Analysis Attacks in FAST SOFTWARE ENCRYPTION
  • 2015-04-14. Robust Authenticated-Encryption AEZ and the Problem That It Solves in ADVANCES IN CRYPTOLOGY -- EUROCRYPT 2015
  • 2017-08-25. Gimli : A Cross-Platform Permutation in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS – CHES 2017
  • 2016-04-28. Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2016
  • 2010. PRINTcipher: A Block Cipher for IC-Printing in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS, CHES 2010
  • 2015-12-30. Midori: A Block Cipher for Low Energy in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2015
  • 2009. The “Coefficients H” Technique in SELECTED AREAS IN CRYPTOGRAPHY
  • 2002-09-13. Tweakable Block Ciphers in ADVANCES IN CRYPTOLOGY — CRYPTO 2002
  • 2016-11-09. Simpira v2: A Family of Efficient Permutations Using the AES Round Function in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2016
  • 2017-08-17. Efficient Slide Attacks in JOURNAL OF CRYPTOLOGY
  • 2014. CBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ Functions in TOPICS IN CRYPTOLOGY – CT-RSA 2014
  • 2014-11-29. Practical Cryptanalysis of PAES in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2014
  • 2016-07-21. XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees in ADVANCES IN CRYPTOLOGY – CRYPTO 2016
  • 2009. Inside the Hypercube in INFORMATION SECURITY AND PRIVACY
  • 2014-11-29. Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2014
  • 2015-08-12. Security of Keyed Sponge Constructions Using a Modular Proof Approach in FAST SOFTWARE ENCRYPTION
  • 2010. Improved Differential Attacks for ECHO and Grøstl in ADVANCES IN CRYPTOLOGY – CRYPTO 2010
  • 2008-01-01. The Salsa20 Family of Stream Ciphers in NEW STREAM CIPHER DESIGNS
  • 2015-08-12. The Related-Key Security of Iterated Even–Mansour Ciphers in FAST SOFTWARE ENCRYPTION
  • 2016-11-09. Nonlinear Invariant Attack in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2016
  • 1999. Slide Attacks in FAST SOFTWARE ENCRYPTION
  • 2012. Minimalism in Cryptography: The Even-Mansour Scheme Revisited in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2012
  • 2014. Minimizing the Two-Round Even-Mansour Cipher in ADVANCES IN CRYPTOLOGY – CRYPTO 2014
  • 2015-08-01. Tweaking Even-Mansour Ciphers in ADVANCES IN CRYPTOLOGY -- CRYPTO 2015
  • 2014. NORX: Parallel and Scalable AEAD in COMPUTER SECURITY - ESORICS 2014
  • 2012. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2012
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s10623-021-00850-2

    DOI

    http://dx.doi.org/10.1007/s10623-021-00850-2

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1135665600


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Digital Security Group, Radboud University, Nijmegen, The Netherlands", 
              "id": "http://www.grid.ac/institutes/grid.5590.9", 
              "name": [
                "Digital Security Group, Radboud University, Nijmegen, The Netherlands"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Mennink", 
            "givenName": "Bart", 
            "id": "sg:person.012130641461.76", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012130641461.76"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "CISUC, Department of Informatics Engineering, University of Coimbra, Coimbra, Portugal", 
              "id": "http://www.grid.ac/institutes/grid.8051.c", 
              "name": [
                "CISUC, Department of Informatics Engineering, University of Coimbra, Coimbra, Portugal"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Neves", 
            "givenName": "Samuel", 
            "id": "sg:person.011136377232.42", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011136377232.42"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-662-48116-5_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052453062", 
              "https://doi.org/10.1007/978-3-662-48116-5_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-53887-6_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1087228552", 
              "https://doi.org/10.1007/978-3-662-53887-6_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-04852-9_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018452132", 
              "https://doi.org/10.1007/978-3-319-04852-9_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-53890-6_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1087228553", 
              "https://doi.org/10.1007/978-3-662-53890-6_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-52993-5_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1031299115", 
              "https://doi.org/10.1007/978-3-662-52993-5_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-44371-2_3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008932700", 
              "https://doi.org/10.1007/978-3-662-44371-2_3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-11212-1_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1048723509", 
              "https://doi.org/10.1007/978-3-319-11212-1_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48519-8_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030136651", 
              "https://doi.org/10.1007/3-540-48519-8_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-47989-6_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047706460", 
              "https://doi.org/10.1007/978-3-662-47989-6_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-70697-9_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1092754924", 
              "https://doi.org/10.1007/978-3-319-70697-9_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-13051-4_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000535582", 
              "https://doi.org/10.1007/978-3-319-13051-4_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-49890-3_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041819638", 
              "https://doi.org/10.1007/978-3-662-49890-3_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-22792-9_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038458885", 
              "https://doi.org/10.1007/978-3-642-22792-9_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-48800-3_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1045485665", 
              "https://doi.org/10.1007/978-3-662-48800-3_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-1-4757-0602-4_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034848944", 
              "https://doi.org/10.1007/978-1-4757-0602-4_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13858-4_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021386175", 
              "https://doi.org/10.1007/978-3-642-13858-4_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-04159-4_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004018040", 
              "https://doi.org/10.1007/978-3-642-04159-4_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00145-017-9266-8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1091231196", 
              "https://doi.org/10.1007/s00145-017-9266-8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-55220-5_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020563393", 
              "https://doi.org/10.1007/978-3-642-55220-5_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-53018-4_3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006854059", 
              "https://doi.org/10.1007/978-3-662-53018-4_3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-57332-1_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027406447", 
              "https://doi.org/10.1007/3-540-57332-1_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45708-9_3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022856116", 
              "https://doi.org/10.1007/3-540-45708-9_3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-030-03326-2_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1107870536", 
              "https://doi.org/10.1007/978-3-030-03326-2_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-47989-6_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046919227", 
              "https://doi.org/10.1007/978-3-662-47989-6_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-47989-6_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041121218", 
              "https://doi.org/10.1007/978-3-662-47989-6_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-46800-5_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1045543954", 
              "https://doi.org/10.1007/978-3-662-46800-5_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-04722-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052093804", 
              "https://doi.org/10.1007/978-3-662-04722-4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-21702-9_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005478912", 
              "https://doi.org/10.1007/978-3-642-21702-9_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-02620-1_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005097014", 
              "https://doi.org/10.1007/978-3-642-02620-1_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-66787-4_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1091344107", 
              "https://doi.org/10.1007/978-3-319-66787-4_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-47989-6_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1025223765", 
              "https://doi.org/10.1007/978-3-662-47989-6_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00145-010-9091-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1026297622", 
              "https://doi.org/10.1007/s00145-010-9091-9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-29011-4_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027084592", 
              "https://doi.org/10.1007/978-3-642-29011-4_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-29011-4_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041647739", 
              "https://doi.org/10.1007/978-3-642-29011-4_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-46800-5_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004351006", 
              "https://doi.org/10.1007/978-3-662-46800-5_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-04852-9_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016324078", 
              "https://doi.org/10.1007/978-3-319-04852-9_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14623-7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014358648", 
              "https://doi.org/10.1007/978-3-642-14623-7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-45608-8_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003371226", 
              "https://doi.org/10.1007/978-3-662-45608-8_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-48800-3_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1012394201", 
              "https://doi.org/10.1007/978-3-662-48800-3_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44706-7_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006428912", 
              "https://doi.org/10.1007/3-540-44706-7_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-013-9840-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044771710", 
              "https://doi.org/10.1007/s10623-013-9840-5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-63715-0_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1090971752", 
              "https://doi.org/10.1007/978-3-319-63715-0_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-29011-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041363493", 
              "https://doi.org/10.1007/978-3-642-29011-4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-38980-1_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034905699", 
              "https://doi.org/10.1007/978-3-642-38980-1_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-22792-9_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016551572", 
              "https://doi.org/10.1007/978-3-642-22792-9_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-13051-4_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023678215", 
              "https://doi.org/10.1007/978-3-319-13051-4_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-48116-5_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1048483099", 
              "https://doi.org/10.1007/978-3-662-48116-5_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-30556-9_27", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024482299", 
              "https://doi.org/10.1007/978-3-540-30556-9_27"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-68351-3_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052896772", 
              "https://doi.org/10.1007/978-3-540-68351-3_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11506447_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1028180690", 
              "https://doi.org/10.1007/11506447_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-15031-9_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047435450", 
              "https://doi.org/10.1007/978-3-642-15031-9_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-014-9969-x", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013540306", 
              "https://doi.org/10.1007/s10623-014-9969-x"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-017-0347-3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1084025927", 
              "https://doi.org/10.1007/s10623-017-0347-3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36178-2_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030559387", 
              "https://doi.org/10.1007/3-540-36178-2_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14623-7_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014932648", 
              "https://doi.org/10.1007/978-3-642-14623-7_20"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2021-02-23", 
        "datePublishedReg": "2021-02-23", 
        "description": "Symmetric cryptographic primitives are often exposed to invariances: deterministic relations between plaintexts and ciphertexts that propagate through the primitive. Recent invariant subspace attacks have shown that these can be a serious issue. One way to mitigate invariant subspace attacks is at the primitive level, namely by proper use of round constants (Beierle et al., CRYPTO 2017). In this work, we investigate how to thwart invariance exploitation at the mode level, namely by assuring that a mode never evaluates its underlying primitive under any invariance. We first formalize the use of invariant cryptographic permutations from a security perspective, and analyze the Even-Mansour block cipher construction. We further demonstrate how the model composes, and apply it to the keyed sponge construction. The security analyses exactly pinpoint how the presence of linear invariances affects the bounds compared with analyses in the random permutation model. As such, they give an exact indication how invariances can be exploited. From a practical side, we apply the derived security bounds to the case where the Even-Mansour construction is instantiated with the 512-bit ChaCha permutation, and derive a distinguishing attack against Even-Mansour-ChaCha in 2128\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$2^{128}$$\\end{document} queries, faster than the birthday bound. Comparable results are derived for instantiation using the 200-bit Keccak permutation without round constants (attack in 250\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$2^{50}$$\\end{document} queries), the 1024-bit CubeHash permutation (attack in 2256\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$2^{256}$$\\end{document} queries), and the 384-bit Gimli permutation without round constants (attack in 296\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$2^{96}$$\\end{document} queries). The attacks do not invalidate the security of the permutations themselves, but rather they demonstrate the tightness of our bounds and confirm that care should be taken when employing a cryptographic primitive that has nontrivial linear invariances.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s10623-021-00850-2", 
        "isAccessibleForFree": true, 
        "isPartOf": [
          {
            "id": "sg:journal.1136552", 
            "issn": [
              "0925-1022", 
              "1573-7586"
            ], 
            "name": "Designs, Codes and Cryptography", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "5", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "89"
          }
        ], 
        "keywords": [
          "cryptographic primitives", 
          "symmetric cryptographic primitives", 
          "invariant subspace attack", 
          "security analysis", 
          "Even-Mansour", 
          "round constants", 
          "security perspective", 
          "block cipher construction", 
          "model composes", 
          "Even-Mansour construction", 
          "primitives", 
          "cryptographic permutation", 
          "sponge construction", 
          "security bounds", 
          "Keccak permutation", 
          "attacks", 
          "primitive level", 
          "linear invariance", 
          "practical side", 
          "distinguishing attack", 
          "plaintext", 
          "ciphertext", 
          "serious issue", 
          "mode level", 
          "permutations", 
          "random permutation model", 
          "queries", 
          "bounds", 
          "ChaCha", 
          "instantiation", 
          "security", 
          "comparable results", 
          "construction", 
          "composes", 
          "permutation model", 
          "invariance", 
          "issues", 
          "way", 
          "proper use", 
          "use", 
          "exploitation", 
          "work", 
          "model", 
          "perspective", 
          "analysis", 
          "resilience", 
          "results", 
          "deterministic relation", 
          "levels", 
          "mode", 
          "cases", 
          "tightness", 
          "relation", 
          "side", 
          "care", 
          "constants", 
          "presence", 
          "indications", 
          "birthday", 
          "exact indications"
        ], 
        "name": "On the Resilience of Even-Mansour to Invariant Permutations", 
        "pagination": "859-893", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1135665600"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s10623-021-00850-2"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s10623-021-00850-2", 
          "https://app.dimensions.ai/details/publication/pub.1135665600"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-11-24T21:06", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20221124/entities/gbq_results/article/article_894.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s10623-021-00850-2"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s10623-021-00850-2'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s10623-021-00850-2'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s10623-021-00850-2'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s10623-021-00850-2'


     

    This table displays all metadata directly associated to this object as RDF triples.

    347 TRIPLES      21 PREDICATES      139 URIs      76 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s10623-021-00850-2 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N37c60c9b46b34cfe9602cb3a32ee5f64
    4 schema:citation sg:pub.10.1007/11506447_11
    5 sg:pub.10.1007/3-540-36178-2_10
    6 sg:pub.10.1007/3-540-44706-7_10
    7 sg:pub.10.1007/3-540-45708-9_3
    8 sg:pub.10.1007/3-540-48519-8_18
    9 sg:pub.10.1007/3-540-57332-1_17
    10 sg:pub.10.1007/978-1-4757-0602-4_8
    11 sg:pub.10.1007/978-3-030-03326-2_1
    12 sg:pub.10.1007/978-3-319-04852-9_13
    13 sg:pub.10.1007/978-3-319-04852-9_21
    14 sg:pub.10.1007/978-3-319-11212-1_2
    15 sg:pub.10.1007/978-3-319-13051-4_14
    16 sg:pub.10.1007/978-3-319-13051-4_19
    17 sg:pub.10.1007/978-3-319-63715-0_22
    18 sg:pub.10.1007/978-3-319-66787-4_15
    19 sg:pub.10.1007/978-3-319-70697-9_21
    20 sg:pub.10.1007/978-3-540-30556-9_27
    21 sg:pub.10.1007/978-3-540-68351-3_8
    22 sg:pub.10.1007/978-3-642-02620-1_14
    23 sg:pub.10.1007/978-3-642-04159-4_21
    24 sg:pub.10.1007/978-3-642-13858-4_20
    25 sg:pub.10.1007/978-3-642-14623-7
    26 sg:pub.10.1007/978-3-642-14623-7_20
    27 sg:pub.10.1007/978-3-642-15031-9_2
    28 sg:pub.10.1007/978-3-642-21702-9_18
    29 sg:pub.10.1007/978-3-642-22792-9_12
    30 sg:pub.10.1007/978-3-642-22792-9_13
    31 sg:pub.10.1007/978-3-642-29011-4
    32 sg:pub.10.1007/978-3-642-29011-4_21
    33 sg:pub.10.1007/978-3-642-29011-4_5
    34 sg:pub.10.1007/978-3-642-38980-1_8
    35 sg:pub.10.1007/978-3-642-55220-5_19
    36 sg:pub.10.1007/978-3-662-04722-4
    37 sg:pub.10.1007/978-3-662-44371-2_3
    38 sg:pub.10.1007/978-3-662-45608-8_15
    39 sg:pub.10.1007/978-3-662-46800-5_11
    40 sg:pub.10.1007/978-3-662-46800-5_2
    41 sg:pub.10.1007/978-3-662-47989-6_10
    42 sg:pub.10.1007/978-3-662-47989-6_17
    43 sg:pub.10.1007/978-3-662-47989-6_18
    44 sg:pub.10.1007/978-3-662-47989-6_9
    45 sg:pub.10.1007/978-3-662-48116-5_17
    46 sg:pub.10.1007/978-3-662-48116-5_18
    47 sg:pub.10.1007/978-3-662-48800-3_17
    48 sg:pub.10.1007/978-3-662-48800-3_19
    49 sg:pub.10.1007/978-3-662-49890-3_11
    50 sg:pub.10.1007/978-3-662-52993-5_1
    51 sg:pub.10.1007/978-3-662-53018-4_3
    52 sg:pub.10.1007/978-3-662-53887-6_4
    53 sg:pub.10.1007/978-3-662-53890-6_1
    54 sg:pub.10.1007/s00145-010-9091-9
    55 sg:pub.10.1007/s00145-017-9266-8
    56 sg:pub.10.1007/s10623-013-9840-5
    57 sg:pub.10.1007/s10623-014-9969-x
    58 sg:pub.10.1007/s10623-017-0347-3
    59 schema:datePublished 2021-02-23
    60 schema:datePublishedReg 2021-02-23
    61 schema:description Symmetric cryptographic primitives are often exposed to invariances: deterministic relations between plaintexts and ciphertexts that propagate through the primitive. Recent invariant subspace attacks have shown that these can be a serious issue. One way to mitigate invariant subspace attacks is at the primitive level, namely by proper use of round constants (Beierle et al., CRYPTO 2017). In this work, we investigate how to thwart invariance exploitation at the mode level, namely by assuring that a mode never evaluates its underlying primitive under any invariance. We first formalize the use of invariant cryptographic permutations from a security perspective, and analyze the Even-Mansour block cipher construction. We further demonstrate how the model composes, and apply it to the keyed sponge construction. The security analyses exactly pinpoint how the presence of linear invariances affects the bounds compared with analyses in the random permutation model. As such, they give an exact indication how invariances can be exploited. From a practical side, we apply the derived security bounds to the case where the Even-Mansour construction is instantiated with the 512-bit ChaCha permutation, and derive a distinguishing attack against Even-Mansour-ChaCha in 2128\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{128}$$\end{document} queries, faster than the birthday bound. Comparable results are derived for instantiation using the 200-bit Keccak permutation without round constants (attack in 250\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{50}$$\end{document} queries), the 1024-bit CubeHash permutation (attack in 2256\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{256}$$\end{document} queries), and the 384-bit Gimli permutation without round constants (attack in 296\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{96}$$\end{document} queries). The attacks do not invalidate the security of the permutations themselves, but rather they demonstrate the tightness of our bounds and confirm that care should be taken when employing a cryptographic primitive that has nontrivial linear invariances.
    62 schema:genre article
    63 schema:isAccessibleForFree true
    64 schema:isPartOf N1fc6fe43a5e84f6fb8cd2bbfe3363141
    65 Nfafcf12fe185481db8dba6492a344be3
    66 sg:journal.1136552
    67 schema:keywords ChaCha
    68 Even-Mansour
    69 Even-Mansour construction
    70 Keccak permutation
    71 analysis
    72 attacks
    73 birthday
    74 block cipher construction
    75 bounds
    76 care
    77 cases
    78 ciphertext
    79 comparable results
    80 composes
    81 constants
    82 construction
    83 cryptographic permutation
    84 cryptographic primitives
    85 deterministic relation
    86 distinguishing attack
    87 exact indications
    88 exploitation
    89 indications
    90 instantiation
    91 invariance
    92 invariant subspace attack
    93 issues
    94 levels
    95 linear invariance
    96 mode
    97 mode level
    98 model
    99 model composes
    100 permutation model
    101 permutations
    102 perspective
    103 plaintext
    104 practical side
    105 presence
    106 primitive level
    107 primitives
    108 proper use
    109 queries
    110 random permutation model
    111 relation
    112 resilience
    113 results
    114 round constants
    115 security
    116 security analysis
    117 security bounds
    118 security perspective
    119 serious issue
    120 side
    121 sponge construction
    122 symmetric cryptographic primitives
    123 tightness
    124 use
    125 way
    126 work
    127 schema:name On the Resilience of Even-Mansour to Invariant Permutations
    128 schema:pagination 859-893
    129 schema:productId N668181cbc3ed475dba420196dc5abd9e
    130 Nb9c8a1475179429a8848a3df89ea91ab
    131 schema:sameAs https://app.dimensions.ai/details/publication/pub.1135665600
    132 https://doi.org/10.1007/s10623-021-00850-2
    133 schema:sdDatePublished 2022-11-24T21:06
    134 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    135 schema:sdPublisher N0e6e678f24a64bf8870fc637c23aa56e
    136 schema:url https://doi.org/10.1007/s10623-021-00850-2
    137 sgo:license sg:explorer/license/
    138 sgo:sdDataset articles
    139 rdf:type schema:ScholarlyArticle
    140 N0e6e678f24a64bf8870fc637c23aa56e schema:name Springer Nature - SN SciGraph project
    141 rdf:type schema:Organization
    142 N1fc6fe43a5e84f6fb8cd2bbfe3363141 schema:issueNumber 5
    143 rdf:type schema:PublicationIssue
    144 N37c60c9b46b34cfe9602cb3a32ee5f64 rdf:first sg:person.012130641461.76
    145 rdf:rest Ne5f5ccfca52741f3a5570a0d23a53233
    146 N668181cbc3ed475dba420196dc5abd9e schema:name dimensions_id
    147 schema:value pub.1135665600
    148 rdf:type schema:PropertyValue
    149 Nb9c8a1475179429a8848a3df89ea91ab schema:name doi
    150 schema:value 10.1007/s10623-021-00850-2
    151 rdf:type schema:PropertyValue
    152 Ne5f5ccfca52741f3a5570a0d23a53233 rdf:first sg:person.011136377232.42
    153 rdf:rest rdf:nil
    154 Nfafcf12fe185481db8dba6492a344be3 schema:volumeNumber 89
    155 rdf:type schema:PublicationVolume
    156 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    157 schema:name Information and Computing Sciences
    158 rdf:type schema:DefinedTerm
    159 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    160 schema:name Data Format
    161 rdf:type schema:DefinedTerm
    162 sg:journal.1136552 schema:issn 0925-1022
    163 1573-7586
    164 schema:name Designs, Codes and Cryptography
    165 schema:publisher Springer Nature
    166 rdf:type schema:Periodical
    167 sg:person.011136377232.42 schema:affiliation grid-institutes:grid.8051.c
    168 schema:familyName Neves
    169 schema:givenName Samuel
    170 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011136377232.42
    171 rdf:type schema:Person
    172 sg:person.012130641461.76 schema:affiliation grid-institutes:grid.5590.9
    173 schema:familyName Mennink
    174 schema:givenName Bart
    175 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012130641461.76
    176 rdf:type schema:Person
    177 sg:pub.10.1007/11506447_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028180690
    178 https://doi.org/10.1007/11506447_11
    179 rdf:type schema:CreativeWork
    180 sg:pub.10.1007/3-540-36178-2_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030559387
    181 https://doi.org/10.1007/3-540-36178-2_10
    182 rdf:type schema:CreativeWork
    183 sg:pub.10.1007/3-540-44706-7_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006428912
    184 https://doi.org/10.1007/3-540-44706-7_10
    185 rdf:type schema:CreativeWork
    186 sg:pub.10.1007/3-540-45708-9_3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022856116
    187 https://doi.org/10.1007/3-540-45708-9_3
    188 rdf:type schema:CreativeWork
    189 sg:pub.10.1007/3-540-48519-8_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030136651
    190 https://doi.org/10.1007/3-540-48519-8_18
    191 rdf:type schema:CreativeWork
    192 sg:pub.10.1007/3-540-57332-1_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027406447
    193 https://doi.org/10.1007/3-540-57332-1_17
    194 rdf:type schema:CreativeWork
    195 sg:pub.10.1007/978-1-4757-0602-4_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034848944
    196 https://doi.org/10.1007/978-1-4757-0602-4_8
    197 rdf:type schema:CreativeWork
    198 sg:pub.10.1007/978-3-030-03326-2_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1107870536
    199 https://doi.org/10.1007/978-3-030-03326-2_1
    200 rdf:type schema:CreativeWork
    201 sg:pub.10.1007/978-3-319-04852-9_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018452132
    202 https://doi.org/10.1007/978-3-319-04852-9_13
    203 rdf:type schema:CreativeWork
    204 sg:pub.10.1007/978-3-319-04852-9_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016324078
    205 https://doi.org/10.1007/978-3-319-04852-9_21
    206 rdf:type schema:CreativeWork
    207 sg:pub.10.1007/978-3-319-11212-1_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1048723509
    208 https://doi.org/10.1007/978-3-319-11212-1_2
    209 rdf:type schema:CreativeWork
    210 sg:pub.10.1007/978-3-319-13051-4_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000535582
    211 https://doi.org/10.1007/978-3-319-13051-4_14
    212 rdf:type schema:CreativeWork
    213 sg:pub.10.1007/978-3-319-13051-4_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023678215
    214 https://doi.org/10.1007/978-3-319-13051-4_19
    215 rdf:type schema:CreativeWork
    216 sg:pub.10.1007/978-3-319-63715-0_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1090971752
    217 https://doi.org/10.1007/978-3-319-63715-0_22
    218 rdf:type schema:CreativeWork
    219 sg:pub.10.1007/978-3-319-66787-4_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091344107
    220 https://doi.org/10.1007/978-3-319-66787-4_15
    221 rdf:type schema:CreativeWork
    222 sg:pub.10.1007/978-3-319-70697-9_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1092754924
    223 https://doi.org/10.1007/978-3-319-70697-9_21
    224 rdf:type schema:CreativeWork
    225 sg:pub.10.1007/978-3-540-30556-9_27 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024482299
    226 https://doi.org/10.1007/978-3-540-30556-9_27
    227 rdf:type schema:CreativeWork
    228 sg:pub.10.1007/978-3-540-68351-3_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052896772
    229 https://doi.org/10.1007/978-3-540-68351-3_8
    230 rdf:type schema:CreativeWork
    231 sg:pub.10.1007/978-3-642-02620-1_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005097014
    232 https://doi.org/10.1007/978-3-642-02620-1_14
    233 rdf:type schema:CreativeWork
    234 sg:pub.10.1007/978-3-642-04159-4_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004018040
    235 https://doi.org/10.1007/978-3-642-04159-4_21
    236 rdf:type schema:CreativeWork
    237 sg:pub.10.1007/978-3-642-13858-4_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021386175
    238 https://doi.org/10.1007/978-3-642-13858-4_20
    239 rdf:type schema:CreativeWork
    240 sg:pub.10.1007/978-3-642-14623-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014358648
    241 https://doi.org/10.1007/978-3-642-14623-7
    242 rdf:type schema:CreativeWork
    243 sg:pub.10.1007/978-3-642-14623-7_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014932648
    244 https://doi.org/10.1007/978-3-642-14623-7_20
    245 rdf:type schema:CreativeWork
    246 sg:pub.10.1007/978-3-642-15031-9_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047435450
    247 https://doi.org/10.1007/978-3-642-15031-9_2
    248 rdf:type schema:CreativeWork
    249 sg:pub.10.1007/978-3-642-21702-9_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005478912
    250 https://doi.org/10.1007/978-3-642-21702-9_18
    251 rdf:type schema:CreativeWork
    252 sg:pub.10.1007/978-3-642-22792-9_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038458885
    253 https://doi.org/10.1007/978-3-642-22792-9_12
    254 rdf:type schema:CreativeWork
    255 sg:pub.10.1007/978-3-642-22792-9_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016551572
    256 https://doi.org/10.1007/978-3-642-22792-9_13
    257 rdf:type schema:CreativeWork
    258 sg:pub.10.1007/978-3-642-29011-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041363493
    259 https://doi.org/10.1007/978-3-642-29011-4
    260 rdf:type schema:CreativeWork
    261 sg:pub.10.1007/978-3-642-29011-4_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027084592
    262 https://doi.org/10.1007/978-3-642-29011-4_21
    263 rdf:type schema:CreativeWork
    264 sg:pub.10.1007/978-3-642-29011-4_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041647739
    265 https://doi.org/10.1007/978-3-642-29011-4_5
    266 rdf:type schema:CreativeWork
    267 sg:pub.10.1007/978-3-642-38980-1_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034905699
    268 https://doi.org/10.1007/978-3-642-38980-1_8
    269 rdf:type schema:CreativeWork
    270 sg:pub.10.1007/978-3-642-55220-5_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020563393
    271 https://doi.org/10.1007/978-3-642-55220-5_19
    272 rdf:type schema:CreativeWork
    273 sg:pub.10.1007/978-3-662-04722-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052093804
    274 https://doi.org/10.1007/978-3-662-04722-4
    275 rdf:type schema:CreativeWork
    276 sg:pub.10.1007/978-3-662-44371-2_3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008932700
    277 https://doi.org/10.1007/978-3-662-44371-2_3
    278 rdf:type schema:CreativeWork
    279 sg:pub.10.1007/978-3-662-45608-8_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003371226
    280 https://doi.org/10.1007/978-3-662-45608-8_15
    281 rdf:type schema:CreativeWork
    282 sg:pub.10.1007/978-3-662-46800-5_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045543954
    283 https://doi.org/10.1007/978-3-662-46800-5_11
    284 rdf:type schema:CreativeWork
    285 sg:pub.10.1007/978-3-662-46800-5_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004351006
    286 https://doi.org/10.1007/978-3-662-46800-5_2
    287 rdf:type schema:CreativeWork
    288 sg:pub.10.1007/978-3-662-47989-6_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046919227
    289 https://doi.org/10.1007/978-3-662-47989-6_10
    290 rdf:type schema:CreativeWork
    291 sg:pub.10.1007/978-3-662-47989-6_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047706460
    292 https://doi.org/10.1007/978-3-662-47989-6_17
    293 rdf:type schema:CreativeWork
    294 sg:pub.10.1007/978-3-662-47989-6_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1025223765
    295 https://doi.org/10.1007/978-3-662-47989-6_18
    296 rdf:type schema:CreativeWork
    297 sg:pub.10.1007/978-3-662-47989-6_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041121218
    298 https://doi.org/10.1007/978-3-662-47989-6_9
    299 rdf:type schema:CreativeWork
    300 sg:pub.10.1007/978-3-662-48116-5_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052453062
    301 https://doi.org/10.1007/978-3-662-48116-5_17
    302 rdf:type schema:CreativeWork
    303 sg:pub.10.1007/978-3-662-48116-5_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1048483099
    304 https://doi.org/10.1007/978-3-662-48116-5_18
    305 rdf:type schema:CreativeWork
    306 sg:pub.10.1007/978-3-662-48800-3_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045485665
    307 https://doi.org/10.1007/978-3-662-48800-3_17
    308 rdf:type schema:CreativeWork
    309 sg:pub.10.1007/978-3-662-48800-3_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012394201
    310 https://doi.org/10.1007/978-3-662-48800-3_19
    311 rdf:type schema:CreativeWork
    312 sg:pub.10.1007/978-3-662-49890-3_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041819638
    313 https://doi.org/10.1007/978-3-662-49890-3_11
    314 rdf:type schema:CreativeWork
    315 sg:pub.10.1007/978-3-662-52993-5_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1031299115
    316 https://doi.org/10.1007/978-3-662-52993-5_1
    317 rdf:type schema:CreativeWork
    318 sg:pub.10.1007/978-3-662-53018-4_3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006854059
    319 https://doi.org/10.1007/978-3-662-53018-4_3
    320 rdf:type schema:CreativeWork
    321 sg:pub.10.1007/978-3-662-53887-6_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1087228552
    322 https://doi.org/10.1007/978-3-662-53887-6_4
    323 rdf:type schema:CreativeWork
    324 sg:pub.10.1007/978-3-662-53890-6_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1087228553
    325 https://doi.org/10.1007/978-3-662-53890-6_1
    326 rdf:type schema:CreativeWork
    327 sg:pub.10.1007/s00145-010-9091-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026297622
    328 https://doi.org/10.1007/s00145-010-9091-9
    329 rdf:type schema:CreativeWork
    330 sg:pub.10.1007/s00145-017-9266-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091231196
    331 https://doi.org/10.1007/s00145-017-9266-8
    332 rdf:type schema:CreativeWork
    333 sg:pub.10.1007/s10623-013-9840-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044771710
    334 https://doi.org/10.1007/s10623-013-9840-5
    335 rdf:type schema:CreativeWork
    336 sg:pub.10.1007/s10623-014-9969-x schema:sameAs https://app.dimensions.ai/details/publication/pub.1013540306
    337 https://doi.org/10.1007/s10623-014-9969-x
    338 rdf:type schema:CreativeWork
    339 sg:pub.10.1007/s10623-017-0347-3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1084025927
    340 https://doi.org/10.1007/s10623-017-0347-3
    341 rdf:type schema:CreativeWork
    342 grid-institutes:grid.5590.9 schema:alternateName Digital Security Group, Radboud University, Nijmegen, The Netherlands
    343 schema:name Digital Security Group, Radboud University, Nijmegen, The Netherlands
    344 rdf:type schema:Organization
    345 grid-institutes:grid.8051.c schema:alternateName CISUC, Department of Informatics Engineering, University of Coimbra, Coimbra, Portugal
    346 schema:name CISUC, Department of Informatics Engineering, University of Coimbra, Coimbra, Portugal
    347 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...