Baignères, ThomasSepehrdad, PouyanVaudenay, Serge2010-10-162010-10-162010-10-16201010.1007/978-3-642-16280-0_10https://infoscience.epfl.ch/handle/20.500.14299/55624In this paper, we study the soundness amplification by repetition of cryptographic protocols. As a tool, we use the Chernoff Information. We specify the number of attempts or samples required to distinguish two distributions efficiently in various protocols. This includes weakly verifiable puzzles such as CAPTCHA-like challenge-response protocols, interactive arguments in sequential composition scenario and cryptanalysis of block ciphers. As our main contribution, we revisit computational soundness amplification by sequential repetition in the threshold case, i.e when completeness is not perfect. Moreover, we outline applications to the Leftover Hash Lemma and iterative attacks on block ciphers.distinguishing distributionsChernoff Informationproof systemsblock ciphersNCCR-MICS, NCCR-MICS/SecuDistinguishing Distributions Using Chernoff Informationtext::conference output::conference proceedings::conference paper