A note on the chi-square method: a tool for proving cryptographic security (Q1749799): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
Normalize DOI.
 
(One intermediate revision by one other user not shown)
Property / DOI
 
Property / DOI: 10.1007/s12095-017-0276-z / rank
Normal rank
 
Property / cites work
 
Property / cites work: Q4249643 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737258 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Indistinguishability of the XOR of $$k$$ Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elements of Information Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information-theoretic indistinguishability via the chi-squared method / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Information and Sufficiency / rank
 
Normal rank
Property / cites work
 
Property / cites work: The advantage of truncated permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: How many queries are needed to distinguish a truncated random permutation from a random function? / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Choosing and Bounding Probability Metrics / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249345 / rank
 
Normal rank
Property / cites work
 
Property / cites work: ZMAC: a fast tweakable block cipher mode for highly secure message authentication / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Blockcipher Modes of Operation with Beyond the Birthday Bound Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374930 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3803964 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: The “Coefficients H” Technique / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Proof of Security in O(2 n ) for the Xor of Two Random Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Approximate distributions of order statistics. With applications to nonparametric statistics / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distance between sampling with and without replacement / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S12095-017-0276-Z / rank
 
Normal rank

Latest revision as of 08:07, 11 December 2024

scientific article
Language Label Description Also known as
English
A note on the chi-square method: a tool for proving cryptographic security
scientific article

    Statements

    A note on the chi-square method: a tool for proving cryptographic security (English)
    0 references
    0 references
    0 references
    28 May 2018
    0 references
    random permutation
    0 references
    pseudorandom function
    0 references
    \(\chi^{2}\) distance
    0 references
    KL divergence
    0 references
    total variation distance
    0 references
    Pinsker's inequality
    0 references
    sum of random permutation
    0 references
    truncated random permutation
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references