Mirror theory and cryptography
From MaRDI portal
Publication:1675488
DOI10.1007/S00200-017-0326-YzbMATH Open1375.94154OpenAlexW2615109279MaRDI QIDQ1675488FDOQ1675488
Authors: Jacques Patarin
Publication date: 27 October 2017
Published in: Applicable Algebra in Engineering, Communication and Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00200-017-0326-y
Recommendations
generic cryptographic systemsnumber of solutions of linear systems of equalities and inequalitiessecurity proofs in cryptography
Cites Work
Cited In (8)
- Improved multi-user security using the squared-ratio method
- Tight security of cascaded LRW2
- Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory
- How to build optimally secure PRFs using block ciphers
- A modular approach to the security analysis of two-permutation constructions
- Provably secure reflection ciphers
- Proof of mirror theory for a wide range of \(\xi_{\max }\)
- Categorization of faulty nonce misuse resistant message authentication
This page was built for publication: Mirror theory and cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1675488)