Building Secure Block Ciphers on Generic Attacks Assumptions (Q3644193): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-642-04159-4_5 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2169357192 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foiling Birthday Attacks in Length-Doubling Transformations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two practical and provably secure block ciphers: BEAR and LION / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dial C for Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: KFC – The Krazy Feistel Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: The security of the cipher block chaining message authentication code / rank
 
Normal rank
Property / cites work
 
Property / cites work: QUAD: A Practical Stream Cipher with Provable Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Simple Unpredictable Pseudo-Random Number Generator / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4413867 / rank
 
Normal rank
Property / cites work
 
Property / cites work: VSH, an Efficient and Provable Collision-Resistant Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4198056 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3729902 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Perfect Block Ciphers with Small Blocks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249329 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Protect DES Against Exhaustive Key Search / rank
 
Normal rank
Property / cites work
 
Property / cites work: Another look at ``provable security'' / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Construct Pseudorandom Permutations from Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279681 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434898 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4950452 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035727 / rank
 
Normal rank
Property / cites work
 
Property / cites work: About Feistel Schemes with Six (or More) Rounds / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474175 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Cryptology - ICISC 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic Attacks on Feistel Networks with Internal Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250766 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Decorrelation: a theory for block cipher security / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses / rank
 
Normal rank

Latest revision as of 03:20, 2 July 2024

scientific article
Language Label Description Also known as
English
Building Secure Block Ciphers on Generic Attacks Assumptions
scientific article

    Statements

    Building Secure Block Ciphers on Generic Attacks Assumptions (English)
    0 references
    0 references
    0 references
    3 November 2009
    0 references
    0 references
    block ciphers
    0 references
    Feistel schemes
    0 references
    generic attacks
    0 references
    provable security
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references