Mirror theory and its applications in crypography/
xxi, 205 pages, Content notes : Foundations -- Introduction -- Defining security -- H-technique --
Results and proofs -- The mirror theory problem -- Toying with CMTP -- CMTP for ξmax = 2 -- CMTP for general ξmax -- BMTP for ξmax = 2 -- BMTP in tweakable permutation setting -- Preliminaries for the RMTP problem -- Regular partite RMTP -- Compete RMTP --
Motivations and applications -- Applications of complete and bipartite mirror theory for ξmax =
2 -- 109
13.1 XOR1 construction: Applications of CMTP for ξmax = 2 -- Cryptographic applications of theorem -- Application of theorem 9.1 : lrw+ -- Application of theorem 11.1 : sum of r even-mansour -- Application of theorem 12.1 : 1k-dbhts --
Reflections -- Conclusion and future directions --
Appendix Mirror Theory Pseudorandom Functions Pseudorandom Permutations Beyond-birthday-bound Security Random Oracle Model H Coefficient Technique System of Equations and Non-equations Tweakable Blockciphers Information-theoretic Security
