How to build an ideal cipher: the indifferentiability of the Feistel construction (Q271585): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
Normalize DOI.
 
(5 intermediate revisions by 5 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s00145-014-9189-6 / rank
Normal rank
 
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s00145-014-9189-6 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2080956839 / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q122228210 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Indifferentiability of Key-Alternating Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Indifferentiability of the Sponge Construction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption from the Weil Pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434895 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short signatures from the Weil pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374905 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4365732 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Exact Security of Digital Signatures-How to Sign with RSA and Rabin / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4472069 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409127 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Merkle-Damgård Revisited: How to Construct a Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: The random oracle methodology, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Minimizing the Two-Round Even-Mansour Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Random Oracle Model and the Ideal Cipher Model Are Equivalent / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tight Security Bounds for Key-Alternating Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3212279 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Resource-Restricted Indifferentiability / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-Malleable Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A construction of a cipher from a single pseudorandom permutation. / rank
 
Normal rank
Property / cites work
 
Property / cites work: How To Prove Yourself: Practical Solutions to Identification and Signature Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: The equivalence of the random oracle model and the ideal cipher model, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to protect DES against exhaustive key search (an analysis of DESX). / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Construct Pseudorandom Permutations from Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Construct an Ideal Cipher from a Small Set of Public Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737239 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security/Efficiency Tradeoffs for Permutation-Based Hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Careful with Composition: Limitations of the Indifferentiability Framework / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5750403 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication Theory of Secrecy Systems* / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S00145-014-9189-6 / rank
 
Normal rank

Latest revision as of 13:07, 9 December 2024

scientific article
Language Label Description Also known as
English
How to build an ideal cipher: the indifferentiability of the Feistel construction
scientific article

    Statements

    How to build an ideal cipher: the indifferentiability of the Feistel construction (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    7 April 2016
    0 references
    random oracle model
    0 references
    ideal cipher model
    0 references
    Feistel construction
    0 references
    indifferentiability
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers