{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T09:08:58Z","timestamp":1771146538410,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2018,8,12]],"date-time":"2018-08-12T00:00:00Z","timestamp":1534032000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602302"],"award-info":[{"award-number":["61602302"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s10623-018-0528-8","type":"journal-article","created":{"date-parts":[[2018,8,12]],"date-time":"2018-08-12T05:08:53Z","timestamp":1534050533000},"page":"1297-1322","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Beyond-birthday secure domain-preserving PRFs from a single permutation"],"prefix":"10.1007","volume":"87","author":[{"given":"Chun","family":"Guo","sequence":"first","affiliation":[]},{"given":"Yaobin","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dawu","family":"Gu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,12]]},"reference":[{"key":"528_CR1","unstructured":"Babai L.: The Fourier transform and equations over finite Abelian groups: an introduction to the method of trigonometric sums (lecture notes), Version 1.3, Section 4. http:\/\/people.cs.uchicago.edu\/laci\/reu02\/fourier.pdf ."},{"key":"528_CR2","unstructured":"Bellare M., Impagliazzo R.: A tool for obtaining tighter security analyses of pseudorandom function based constructions, with applications to PRP to PRF conversion. Cryptology ePrint Archive, Report 1999\/024 (1999)."},{"key":"528_CR3","unstructured":"Bellare M., Desai A., Jokipii E., Rogaway P.: A concrete security treatment of symmetric encryption. In: Proceedings, 38th Annual Symposium on Foundations of Computer Science, pp. 394\u2013403. IEEE (1997)."},{"key":"528_CR4","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/BFb0054132","volume-title":"Advances in Cryptology-EUROCRYPT\u201998, LNCS","author":"M Bellare","year":"1998","unstructured":"Bellare M., Krovetz T., Rogaway P.: Luby\u2013Rackoff backwards: increasing security by making block ciphers non-invertible. In: Nyberg K. (ed.) Advances in Cryptology-EUROCRYPT\u201998, LNCS, vol. 1403, pp. 266\u2013280. Springer, Berlin (1998)."},{"issue":"3","key":"528_CR5","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1006\/jcss.1999.1694","volume":"61","author":"M Bellare","year":"2000","unstructured":"Bellare M., Kilian J., Rogaway P.: The security of the cipher block chaining message authentication code. J. Comput. Syst. Sci. 61(3), 362\u2013399 (2000).","journal-title":"J. Comput. Syst. Sci."},{"key":"528_CR6","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/11761679_25","volume-title":"Advances in Cryptology-EUROCRYPT 2006, LNCS","author":"M Bellare","year":"2006","unstructured":"Bellare M., Rogaway P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay S. (ed.) Advances in Cryptology-EUROCRYPT 2006, LNCS, vol. 4004, pp. 409\u2013426. Springer, Berlin (2006)."},{"key":"528_CR7","unstructured":"Bhattacharya S., Nandi M.: Full Indifferentiable Security of the XOR of two or more random permutations using the $$\\chi ^2$$ \u03c7 2 method. In: EUROCRYPT 2018, Part I, pp. 387\u2013412 (2018)."},{"key":"528_CR8","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2007, LNCS","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov A., Knudsen L.R., Leander G., Paar C., Poschmann A., Robshaw M.J.B., Seurin Y., Vikkelsoe C.: PRESENT: an ultra-lightweight block cipher. In: Paillier P., Verbauwhede I. (eds.) Cryptographic Hardware and Embedded Systems-CHES 2007, LNCS, vol. 4727, pp. 450\u2013466. Springer, Berlin (2007)."},{"key":"528_CR9","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-34961-4_14","volume-title":"Advances in Cryptology-ASIACRYPT 2012, LNCS","author":"J Borghoff","year":"2012","unstructured":"Borghoff J., Canteaut A., G\u00fcneysu T., Kavun E., Knezevic M., Knudsen L.R., Leander G., Nikov V., Paar C., Rechberger C., Rombouts P., Thomsen S., Yal\u00e7n T.: PRINCE-a low-latency block cipher for pervasive computing applications. In: Wang X., Sako K. (eds.) Advances in Cryptology-ASIACRYPT 2012, LNCS, vol. 7658, pp. 208\u2013225. Springer, Berlin (2012)."},{"key":"528_CR10","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-55220-5_19","volume-title":"Advances in Cryptology-EUROCRYPT 2014, LNCS","author":"S Chen","year":"2014","unstructured":"Chen S., Steinberger J.: Tight security bounds for key-alternating ciphers. In: Nguyen P.Q., Oswald E. (eds.) Advances in Cryptology-EUROCRYPT 2014, LNCS, vol. 8441, pp. 327\u2013350. Springer, Berlin (2014)."},{"key":"528_CR11","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-662-44371-2_3","volume-title":"Advances in Cryptology-CRYPTO 2014, Part I, LNCS","author":"S Chen","year":"2014","unstructured":"Chen S., Lampe R., Lee J., Seurin Y., Steinberger J.: Minimizing the two-round Even\u2013Mansour cipher. In: Garay J.A., Gennaro R. (eds.) Advances in Cryptology-CRYPTO 2014, Part I, LNCS, vol. 8616, pp. 39\u201356. Springer, Berlin (2014)."},{"key":"528_CR12","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-662-48800-3_6","volume-title":"Advances in Cryptology-ASIACRYPT 2015, Part II, LNCS","author":"B Cogliati","year":"2015","unstructured":"Cogliati B., Seurin Y.: Beyond-birthday-bound security for tweakable Even\u2013Mansour ciphers with linear tweak and key mixing. In: Iwata T., Cheon J.H. (eds.) Advances in Cryptology-ASIACRYPT 2015, Part II, LNCS, vol. 9453, pp. 134\u2013158. Springer, Berlin (2015)."},{"key":"528_CR13","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-662-53018-4_5","volume-title":"Advances in Cryptology-CRYPTO 2016, Part I, LNCS","author":"B Cogliati","year":"2016","unstructured":"Cogliati B., Seurin Y.: EWCDM: an efficient, beyond-birthday secure, nonce-misuse resistant MAC. In: Robshaw M., Katz J. (eds.) Advances in Cryptology-CRYPTO 2016, Part I, LNCS, vol. 9814, pp. 121\u2013149. Springer, Berlin (2016)."},{"key":"528_CR14","doi-asserted-by":"publisher","unstructured":"Cogliati B., Seurin Y.: Analysis of the single-permutation encrypted Davies\u2013Meyer construction. Des. Codes Cryptogr. (2018). https:\/\/doi.org\/10.1007\/s10623-018-0470-9 .","DOI":"10.1007\/s10623-018-0470-9"},{"key":"528_CR15","first-page":"285","volume-title":"FSE 2014, LNCS","author":"B Cogliati","year":"2014","unstructured":"Cogliati B., Lampe R., Patarin J.: The indistinguishability of the XOR of $$k$$ k permutations. In: Cid C., Rechberger C. (eds.) FSE 2014, LNCS, vol. 8540, pp. 285\u2013302. Springer, Berlin (2014)."},{"key":"528_CR16","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1007\/978-3-319-63697-9_17","volume-title":"CRYPTO 2017, Part III, LNCS","author":"W Dai","year":"2017","unstructured":"Dai W., Hoang V.T., Tessaro S.: Information-theoretic indistinguishability via the chi-squared method. In: Katz J., Shacham H. (eds.) CRYPTO 2017, Part III, LNCS, vol. 10403, pp. 497\u2013523. Springer, Berlin (2017)."},{"key":"528_CR17","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-540-78967-3_12","volume-title":"Advances in Cryptology-EUROCRYPT 2008, LNCS","author":"Y Dodis","year":"2008","unstructured":"Dodis Y., Pietrzak K., Puniya P.: A new mode of operation for block ciphers and length-preserving MACs. In: Smart N. (ed.) Advances in Cryptology-EUROCRYPT 2008, LNCS, vol. 4965, pp. 198\u2013219. Springer, Berlin (2008)."},{"key":"528_CR18","first-page":"104","volume-title":"Fast Software Encryption-FSE 2009, LNCS","author":"Y Dodis","year":"2009","unstructured":"Dodis Y., Reyzin L., Rivest R.L., Shen E.: Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6. In: Dunkelman O. (ed.) Fast Software Encryption-FSE 2009, LNCS, vol. 5665, pp. 104\u2013121. Springer, Berlin (2009)."},{"key":"528_CR19","doi-asserted-by":"publisher","unstructured":"Dziembowski S., Pietrzak K.: Leakage-resilient cryptography. In: 49th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2008, 25\u201328 October, 2008, Philadelphia, PA, pp. 293\u2013302 (2008). https:\/\/doi.org\/10.1109\/FOCS.2008.56 .","DOI":"10.1109\/FOCS.2008.56"},{"key":"528_CR20","unstructured":"Gilboa S., Gueron S.: The Advantage of Truncated Permutations (2012). arXiv:1610.02518 ."},{"key":"528_CR21","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/BFb0055742","volume-title":"Advances in Cryptology-CRYPTO\u201998, LNCS","author":"C Hall","year":"1998","unstructured":"Hall C., Wagner D., Kelsey J., Schneier B.: Building PRFs from PRPs. In: Krawczyk H. (ed.) Advances in Cryptology-CRYPTO\u201998, LNCS, vol. 1462, pp. 370\u2013389. Springer, Berlin (1998)."},{"key":"528_CR22","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-53018-4_1","volume-title":"Advances in Cryptology-CRYPTO 2016, Part I, LNCS","author":"VT Hoang","year":"2016","unstructured":"Hoang V.T., Tessaro S.: Key-alternating ciphers and key-length extension: exact bounds and multi-user security. In: Robshaw M., Katz J. (eds.) Advances in Cryptology-CRYPTO 2016, Part I, LNCS, vol. 9814, pp. 3\u201332. Springer, Berlin (2016)."},{"key":"528_CR23","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/978-3-642-40041-4_31","volume-title":"Advances in Cryptology-CRYPTO 2013, LNCS","author":"E Kiltz","year":"2013","unstructured":"Kiltz E., Pietrzak K., Szegedy M.: Digital signatures with minimal overhead from indifferentiable random invertible functions. In: Canetti R., Garay J.A. (eds.) Advances in Cryptology-CRYPTO 2013, LNCS, vol. 8042, pp. 571\u2013588. Springer, Berlin (2013)."},{"key":"528_CR24","doi-asserted-by":"crossref","unstructured":"Luby M., Rackoff C.: Pseudo-random permutation generators and cryptographic composition. In: Proceedings of the Eighteenth Annual ACM Symposium on Theory of Computing, STOC\u201986, ACM, New York, NY, pp. 356\u2013363 (1986)","DOI":"10.1145\/12130.12167"},{"key":"528_CR25","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/3-540-45539-6_34","volume-title":"EUROCRYPT 2000, LNCS","author":"S Lucks","year":"2000","unstructured":"Lucks S.: The sum of PRPs is a secure PRF. In: Preneel B. (ed.) EUROCRYPT 2000, LNCS, vol. 1807, pp. 470\u2013484. Springer, Berlin (2000)."},{"key":"528_CR26","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-17401-8_6","volume-title":"Progress in Cryptology-INDOCRYPT 2010, LNCS","author":"A Mandal","year":"2010","unstructured":"Mandal A., Patarin J., Nachef V.: Indifferentiability beyond the birthday bound for the XOR of two public random permutations. In: Gong G., Gupta K.C. (eds.) Progress in Cryptology-INDOCRYPT 2010, LNCS, vol. 6498, pp. 69\u201381. Springer, Berlin Heidelberg (2010)."},{"key":"528_CR27","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1007\/3-540-39200-9_34","volume-title":"Advances in Cryptology-EUROCRYPT 2003, LNCS","author":"U Maurer","year":"2003","unstructured":"Maurer U., Pietrzak K.: The security of many-round Luby\u2013Rackoff pseudo-random permutations. In: Biham E. (ed.) Advances in Cryptology-EUROCRYPT 2003, LNCS, vol. 2656, pp. 544\u2013561. Springer, Berlin (2003)."},{"key":"528_CR28","first-page":"21","volume-title":"TCC 2004, LNCS","author":"U Maurer","year":"2004","unstructured":"Maurer U., Renner R., Holenstein C.: Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology. In: Naor M. (ed.) TCC 2004, LNCS, vol. 2951, pp. 21\u201339. Springer, Berlin (2004)."},{"key":"528_CR29","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1007\/978-3-319-63697-9_19","volume-title":"Advances in Cryptology-CRYPTO 2017, Part III, LNCS","author":"B Mennink","year":"2017","unstructured":"Mennink B., Neves S.: Encrypted Davies\u2013Meyer and its dual: towards optimal security using mirror theory. In: Katz J., Shacham H. (eds.) Advances in Cryptology-CRYPTO 2017, Part III, LNCS, vol. 10403, pp. 556\u2013583. Springer, Berlin (2017)."},{"issue":"3","key":"528_CR30","doi-asserted-by":"publisher","first-page":"228","DOI":"10.13154\/tosc.v2017.i3.228-252","volume":"2017","author":"B Mennink","year":"2017","unstructured":"Mennink B., Neves S.: Optimal PRFs from blockcipher designs. IACR Trans. Symmetric Cryptol. 2017(3), 228\u2013252 (2017). https:\/\/doi.org\/10.13154\/tosc.v2017.i3.228-252 .","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"528_CR31","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-642-32009-5_20","volume-title":"Advances in Cryptology-CRYPTO 2012, LNCS","author":"B Mennink","year":"2012","unstructured":"Mennink B., Preneel B.: Hash functions based on three permutations: a generic security analysis. In: Safavi-Naini R., Canetti R. (eds.) Advances in Cryptology-CRYPTO 2012, LNCS, vol. 7417, pp. 330\u2013347. Springer, Berlin (2012)."},{"key":"528_CR32","first-page":"619","volume-title":"ACNS 2015, LNCS","author":"B Mennink","year":"2015","unstructured":"Mennink B., Preneel B.: On the XOR of multiple random permutations. In: Malkin T., Kolesnikov V., Lewko A.B., Polychronakis M. (eds.) ACNS 2015, LNCS, vol. 9092, pp. 619\u2013634. Springer, Berlin (2015)."},{"key":"528_CR33","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-540-28628-8_7","volume-title":"Advances in Cryptology-CRYPTO 2004, LNCS","author":"J Patarin","year":"2004","unstructured":"Patarin J.: Security of random Feistel schemes with 5 or more rounds. In: Franklin M. (ed.) Advances in Cryptology-CRYPTO 2004, LNCS, vol. 3152, pp. 106\u2013122. Springer, Berlin (2004)."},{"key":"528_CR34","first-page":"232","volume-title":"Information Theoretic Security-ICITS 2008, LNCS","author":"J Patarin","year":"2008","unstructured":"Patarin J.: A proof of security in $$O(2^n)$$ O ( 2 n ) for the XOR of two random permutations. In: Safavi-Naini R. (ed.) Information Theoretic Security-ICITS 2008, LNCS, vol. 5155, pp. 232\u2013248. Springer, Berlin (2008)."},{"key":"528_CR35","first-page":"328","volume-title":"Selected Areas in Cryptography-SAC 2008, LNCS","author":"J Patarin","year":"2009","unstructured":"Patarin J.: The \u201cCoefficients H\u201d technique. In: Avanzi R.M., Keliher L., Sica F. (eds.) Selected Areas in Cryptography-SAC 2008, LNCS, vol. 5381, pp. 328\u2013345. Springer, Berlin (2009)."},{"key":"528_CR36","unstructured":"Patarin J.: Introduction to mirror theory: analysis of systems of linear equalities and linear non equalities for cryptography. Cryptology ePrint Archive, Report 2010\/287 (2010)."},{"key":"528_CR37","unstructured":"Patarin J.: Security in $$O(2^n)$$ O ( 2 n ) for the XOR of two random permutations. Proof with the standard H technique. Cryptology ePrint Archive, Report 2013\/368 (2013)."},{"key":"528_CR38","unstructured":"Steinberger J.: The sum-capture problem for Abelian groups. (2014). arXiv:1309.5582 ."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0528-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-0528-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0528-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,7]],"date-time":"2020-11-07T16:54:18Z","timestamp":1604768058000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-0528-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,12]]},"references-count":38,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["528"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-0528-8","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,12]]},"assertion":[{"value":"13 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 July 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 July 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}