Action Filename Description Size Access License Resource Version
Show more files...


The authors introduce the black-box model for cryptographic primitives. In this model cryptographic primitives are given by a computation graph, where the computation boxes sitting on the vertices of the graph act as random oracles. They formalize and study a family of generic attacks which generalize exhaustive search and the birthday paradox. They establish complexity lower bounds for these attacks and apply it to compression functions based on the FFT network.