You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The document is generic over abstract descriptions of KEMs and KDFs, but then concretely requires either AES128 or 256 for the PRF. Section 6.1 cites GKWY20, which only considers AES. If someone did security proofs etc., could this method be extended to hashes (TurboSHAKE as in VDAF) or other symmetric ciphers?
The text was updated successfully, but these errors were encountered:
The use of an XOF would be very interesting here. The shape changes quite a bit, of course.
My view is that we'd want to see whether an XOF variant is faster. If it is faster always, then we'd stop using AES. If it is faster sometimes, that might make a case for two options, but we'd need to discuss what the costs look like.
The document is generic over abstract descriptions of KEMs and KDFs, but then concretely requires either AES128 or 256 for the PRF. Section 6.1 cites GKWY20, which only considers AES. If someone did security proofs etc., could this method be extended to hashes (TurboSHAKE as in VDAF) or other symmetric ciphers?
The text was updated successfully, but these errors were encountered: