Mirror theory and cryptography
From MaRDI portal
Publication:1675488
Recommendations
Cites work
- scientific article; zbMATH DE number 3683884 (Why is no real title available?)
- A Combinatorial Problem on Abelian Groups
- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
- Advances in Cryptology – CRYPTO 2004
- Information Security and Cryptology - ICISC 2005
- The “Coefficients H” Technique
Cited in
(8)- Improved multi-user security using the squared-ratio method
- Proof of mirror theory for a wide range of \(\xi_{\max }\)
- Provably secure reflection ciphers
- Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory
- How to build optimally secure PRFs using block ciphers
- Categorization of faulty nonce misuse resistant message authentication
- A modular approach to the security analysis of two-permutation constructions
- Tight security of cascaded LRW2
This page was built for publication: Mirror theory and cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1675488)