Keyed sum of permutations: a simpler RP-based PRF (Q6057195): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Q4249643 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Minimizing the two-round Even-Mansour cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tight Security Bounds for Key-Alternating Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to build pseudorandom functions from public random permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Indistinguishability of the XOR of $$k$$ Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to build an ideal cipher: the indifferentiability of the Feistel construction / rank
 
Normal rank
Property / cites work
 
Property / cites work: 10-Round Feistel is Indifferentiable from an Ideal Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indifferentiability of 8-Round Feistel Networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Minimalism in Cryptography: The Even-Mansour Scheme Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4314029 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - ASIACRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking and Repairing GCM Security Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Analysis of Key-Alternating Feistel Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Construct Pseudorandom Permutations from Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the XOR of Multiple Random Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: The “Coefficients H” Technique / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4036865 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum attacks on sum of Even-Mansour pseudorandom functions / rank
 
Normal rank

Latest revision as of 01:42, 3 August 2024

scientific article; zbMATH DE number 7745620
Language Label Description Also known as
English
Keyed sum of permutations: a simpler RP-based PRF
scientific article; zbMATH DE number 7745620

    Statements

    Keyed sum of permutations: a simpler RP-based PRF (English)
    0 references
    0 references
    0 references
    4 October 2023
    0 references
    RP-to-PRF
    0 references
    SoEM
    0 references
    KSoP
    0 references
    beyond-birthday-bound
    0 references
    provable security
    0 references
    0 references
    0 references
    0 references

    Identifiers