Concrete security estimates have been applied to cryptographic algorithms:
In addition, a software tool named the "Foundational Cryptography Framework", which embeds into Coq, is able to formally verify proofs of concrete security.7 For example, it is able to verify the concrete security of ElGamal encryption.8
"Modern symmetric-key Encryption". University of Maryland. Archived from the original on 2017-09-10. Retrieved 6 May 2021. https://www.cs.umd.edu/class/fall2017/cmsc456/module_5_symmetric_key_encryption.pptx ↩
Kamara, Seny. "Lectures 2+3: Provable Security" (PDF). Archived (PDF) from the original on 2017-02-15. Retrieved 6 May 2021. http://cs.brown.edu/~seny/2950-v/2-provablesecurity.pdf ↩
Bellare, Mihir; Rogaway, Philip (1996). "The Exact Security of Digital Signatures-How to Sign with RSA and Rabin" (PDF). Advances in Cryptology — EUROCRYPT '96. Lecture Notes in Computer Science. Vol. 1070. Springer-Verlag. pp. 399–416. doi:10.1007/3-540-68339-9_34. ISBN 978-3-540-68339-1. 978-3-540-68339-1 ↩
Bellare, Mihir; Desai, A.; Jokipii, E.; Rogaway, Philip (Oct 1997). "A concrete security treatment of symmetric encryption" (PDF). Proceedings 38th Annual Symposium on Foundations of Computer Science. pp. 394–403. doi:10.1109/SFCS.1997.646128. ISBN 0-8186-8197-7. S2CID 42604387. 0-8186-8197-7 ↩
Walter, Michael (2017). "On the Concrete Security of Lattice-Based Cryptography". UC San Diego. Retrieved 6 May 2021. https://escholarship.org/uc/item/5n51z56 ↩
Yang, Jian; Guo, Qian; Johansson, Thomas; Lentmaier, Michael (3 Mar 2021). "Revisiting the Concrete Security of Goldreich's Pseudorandom Generator". arXiv:2103.02668 [cs.CR]. /wiki/ArXiv_(identifier) ↩
Petcher, Adam (14 Oct 2014). "The Foundational Cryptography Framework". arXiv:1410.3735 [cs.PL]. /wiki/ArXiv_(identifier) ↩