{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T04:24:21Z","timestamp":1769315061305,"version":"3.49.0"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,9,24]],"date-time":"2018-09-24T00:00:00Z","timestamp":1537747200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"crossref","award":["H2020-ICT-644209"],"award-info":[{"award-number":["H2020-ICT-644209"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"crossref","award":["H2020-ICT-644209"],"award-info":[{"award-number":["H2020-ICT-644209"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s10623-018-0555-5","type":"journal-article","created":{"date-parts":[[2018,9,24]],"date-time":"2018-09-24T08:46:08Z","timestamp":1537778768000},"page":"1621-1638","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Multi-user security bound for filter permutators in the random oracle model"],"prefix":"10.1007","volume":"87","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6445-2514","authenticated-orcid":false,"given":"Beno\u00eet","family":"Cogliati","sequence":"first","affiliation":[]},{"given":"Titouan","family":"Tanguy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,24]]},"reference":[{"key":"555_CR1","unstructured":"Albrecht M.R., Rechberger C., Schneider T., Tiessen T., Zohner M.: Ciphers for mpc and fhe. In: Oswald, E., Fischlin, M. (eds.) Proceedings, Part I, Advances in Cryptology\u2014EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26\u201330, pp. 430\u2013454. Springer, Berlin (2015)."},{"key":"555_CR2","unstructured":"Armknecht F., Lano J., Preneel B.: Extending the resynchronization attack. In: Handschuh, H., Anwar Hasan, M. (eds.) Selected Areas in Cryptography: 11th International Workshop, SAC 2004, Waterloo, Canada, August 9\u201310, 2004, Revised Selected Papers, pp. 19\u201338. Springer, Berlin (2005)."},{"key":"555_CR3","unstructured":"Bellare M., Yee B.: Forward-security in private-key cryptography. Cryptology ePrint Archive, Report 2001\/035 (2001) http:\/\/eprint.iacr.org\/2001\/035 ."},{"key":"555_CR4","unstructured":"Brakerski Z., Gentry C., Vaikuntanathan V.: (leveled) fully homomorphic encryption without bootstrapping. In: ITCS \u201912, Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, pp. 309\u2013325. ACM, New York (2012)."},{"key":"555_CR5","unstructured":"Canteaut A., Carpov S., Fontaine C., Lepoint T., Naya-Plasencia M., Paillier P., Sirdey R.: Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression. In: Peyrin, T. (ed.) Revised Selected Papers, Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum, Germany, March 20\u201323, pp. 313\u2013333. Springer, Berlin (2016)."},{"key":"555_CR6","doi-asserted-by":"crossref","unstructured":"Carlet C., M\u00e9aux P., Rotella Y.: Boolean functions with restricted input and their robustness; application to the flip cipher. Cryptology ePrint Archive, Report 2017\/097 (2017) http:\/\/eprint.iacr.org\/2017\/097 .","DOI":"10.46586\/tosc.v2017.i3.192-227"},{"key":"555_CR7","unstructured":"Chen S., Steinberger J.: Tight security bounds for key-alternating ciphers. In: Nguyen, P.Q., Oswald, E. (eds.) Advances in Cryptology\u2014EUROCRYPT, LNCS, vol. 8441 pp. 327\u2013350. Springer (2014). Full version available at http:\/\/eprint.iacr.org\/2013\/222 ."},{"key":"555_CR8","unstructured":"Chen S., Lampe R., Lee J., Seurin Y., Steinberger J.P.: Minimizing the two-round even-mansour cipher. In: Garay, J.A., Gennaro, R. (eds.) Advances in Cryptology\u2014CRYPTO 2014 (Proceedings, Part I), LNCS, vol. 8616, pp. 39\u201356. Springer, http:\/\/eprint.iacr.org\/2014\/443 . (2014)."},{"key":"555_CR9","unstructured":"Chillotti I, Gama N., Goubin L.: Attacking fhe-based applications by software fault injections. Cryptology ePrint Archive, Report 2016\/1164 (2016) http:\/\/eprint.iacr.org\/2016\/1164 ."},{"key":"555_CR10","unstructured":"Coron J., Naccache D., Tibouchi M.: Public key compression and modulus switching for fully homomorphic encryption over the integers. In: EUROCRYPT\u201912, Proceedings of the 31st Annual International Conference on Theory and Applications of Cryptographic Techniques, pp. 446\u2013464. Springer, Berlin (2012)."},{"key":"555_CR11","unstructured":"Coron J., Lepoint T., Tibouchi M.: Scale-invariant fully homomorphic encryption over the integers. In: Krawczyk, H. (ed.) Proceedings, Public-Key Cryptography\u2014PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26\u201328, pp. 311\u2013328. Springer, Berlin (2014)."},{"key":"555_CR12","unstructured":"Duval S., Lallemand V., Rotella Y.: Cryptanalysis of the flip family of stream ciphers. In: Proceedings, Part I, of the 36th Annual International Cryptology Conference on Advances in Cryptology\u2014CRYPTO, vol. 9814, pp. 457\u2013475. Springer, New York (2016)."},{"key":"555_CR13","unstructured":"Gentry C.: Fully homomorphic encryption using ideal lattices. In: STOC \u201909, Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, pp. 169\u2013178. ACM, New York (2009)."},{"key":"555_CR14","unstructured":"Gentry C., Halevi S., Smart N.P.: Homomorphic evaluation of the aes circuit. In: Proceedings of the 32Nd Annual Cryptology Conference on Advances in Cryptology\u2014CRYPTO, vol. 7417, pp. 850\u2013867. Springer, New York (2012)."},{"key":"555_CR15","unstructured":"M\u00e9aux P., Journault A., Standaert F.-X., Carlet C.: Towards stream ciphers for efficient FHE with low-noise ciphertexts. In: Proceedings, Part I, Advances in Cryptology\u2014EUROCRYPT 2016\u201435th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8\u201312, pp. 311\u2013343 (2016)."},{"key":"555_CR16","unstructured":"Naehrig M., Lauter K., Vaikuntanathan V.: Can homomorphic encryption be practical? In: CCSW \u201911, Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, pp. 113\u2013124. ACM, New York (2011)."},{"key":"555_CR17","unstructured":"Patarin J.: The coefficients H technique. In: Maria Avanzi, R., Keliher, L., Sica, F. (eds.) Selected Areas in Cryptography\u2014SAC 2008, LNCS, vol. 5381, pp. 328\u2013345. Springer (2008)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0555-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-0555-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0555-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T21:11:08Z","timestamp":1605042668000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-0555-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,24]]},"references-count":17,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["555"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-0555-5","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,24]]},"assertion":[{"value":"2 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}