Linking Stam's bounds with generalized truncation
From MaRDI portal
Publication:2290458
Recommendations
- The summation-truncation hybrid: reusing discarded bits for free
- The advantage of truncated permutations
- Indifferentiability of truncated random permutations
- How many queries are needed to distinguish a truncated random permutation from a random function?
- The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC
Cited in
(7)- Multi-user security of the sum of truncated random permutations
- Security of truncated permutation without initial value
- Luby-Rackoff backwards with more users and more security
- A note on the chi-square method: a tool for proving cryptographic security
- How many queries are needed to distinguish a truncated random permutation from a random function?
- Leakage resilient value comparison with application to message authentication
- The summation-truncation hybrid: reusing discarded bits for free
This page was built for publication: Linking Stam's bounds with generalized truncation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2290458)