BLUE
PWpeterwening.bsky.social

Here are 3 of the victims identified so far, one of them was a farmer. • Tamer Abdullah Mansour • Abdullah Baraka • Shamel Muhammad Ali Baraka

0
Yinhamis.bsky.social

O lailar mansour oq vc ta fazendo aqui hein? 😡😡

1

Angesichts zunehmender Polarisierungen sprechen Josef Schuster, Präsident des Zentralrats der Juden in Deutschland, und Ahmad Mansour, deutscher Psychologe und Islamismusexperte, in „Spannungsfelder“ über Demokratiedefizite, Antisemitismus und den Nahostkonflikt […]

0

Khaldoon, Mansour, etc...

0
Eella2.bsky.social

Alle Experten für alles, niemand Experte für sich selbst. (...a bissl dem #Mansour#Phönix zugehört)

1
Eella2.bsky.social

Ahmad Mansour, auch so einer.

0
ACarxiv-cs-cl.bsky.social

Mujeen Sung, Song Feng, James Gung, Raphael Shu, Yi Zhang, Saab Mansour Structured List-Grounded Question Answering https://arxiv.org/abs/2410.03950

0
EUeprint.bsky.social

Block Ciphers in Idealized Models: Automated Proofs and New Security Results (Miguel Ambrona, Pooya Farshim, Patrick Harasser) ia.cr/2024/1584

Abstract. We develop and implement AlgoROM, a tool to systematically analyze the security of a wide class of symmetric primitives in idealized models of computation. The schemes that we consider are those that can be expressed over an alphabet consisting of XOR and function symbols for hash functions, permutations, or block ciphers.

We implement our framework in OCaml and apply it to a number of prominent constructions, which include the Luby–Rackoff (LR), key-alternating Feistel (KAF), and iterated Even–Mansour (EM) ciphers, as well as substitution-permutation networks (SPN). The security models we consider are (S)PRP, and strengthenings thereof under related-key (RK), key-dependent message (KD), and more generally key-correlated (KC) attacks.

Using AlgoROM, we are able to reconfirm a number of classical and previously established security theorems, and in one case we identify a gap in a proof from the literature (Connolly et al., ToSC’19). However, most results that we prove with AlgoROM are new. In particular, we obtain new positive results for LR, KAF, EM, and SPN in the above models. Our results better reflect the configurations actually implemented in practice, as they use a single idealized primitive. In contrast to many existing tools, our automated proofs do not operate in symbolic models, but rather in the standard probabilistic model for cryptography.
Image showing part 2 of abstract.
0