Главная
Study mode:
on
1
Intro
2
Ideal Cipher Model & Query History
3
Evaluation of Tandem-DM
4
Collisions in Tandem-DM
5
Case Analysis
6
Upper bounding Pr Coll (2)
7
Case 1: The Last Query is TL and Backward At the point when TL is queried, BL Rare fixed
8
Case 2: The Last Query is TL and Forward
9
Main Idea: Modified Adversary A'
10
The Property of the Modified Adversary
11
Main Result
Description:
Explore the collision security of Tandem-DM in the Ideal Cipher Model through this 20-minute talk from Crypto 2011. Delve into the research by Martijn Stam, Joojoung Lee, and John Steinberger as they present their findings on this cryptographic topic. Begin with an introduction to the Ideal Cipher Model and query history before evaluating Tandem-DM and analyzing collisions within it. Examine various cases, including when the last query is TL and backward or forward, and understand the concept of a modified adversary A'. Gain insights into the properties of the modified adversary and discover the main results of this cryptographic analysis.

The Collision Security of Tandem-DM in the Ideal Cipher Model

TheIACR
Add to list