The “Coefficients H” Technique (Q3644210): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-642-04159-4_21 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1498886746 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foiling Birthday Attacks in Length-Doubling Transformations / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Combinatorial Problem on Abelian Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Complete characterization of security notions for probabilistic private-key encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536198 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Construct Pseudorandom Permutations from Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279681 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737239 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434898 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the construction of pseudorandom permutations: Luby-Rackoff revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4950452 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035727 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279682 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474175 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Cryptology - ICISC 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Proof of Security in O(2 n ) for the Benes Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Proof of Security in O(2 n ) for the Xor of Two Random Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Building Secure Block Ciphers on Generic Attacks Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3879444 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unbalanced Feistel networks and block cipher design / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic Attacks on Feistel Networks with Internal Permutations / rank
 
Normal rank

Latest revision as of 03:21, 2 July 2024

scientific article
Language Label Description Also known as
English
The “Coefficients H” Technique
scientific article

    Statements

    The “Coefficients H” Technique (English)
    0 references
    0 references
    3 November 2009
    0 references
    0 references
    0 references