scientific article; zbMATH DE number 1302860
From MaRDI portal
Publication:4249345
zbMATH Open0931.94045MaRDI QIDQ4249345FDOQ4249345
Authors: Chris Hall, David Wagner, John Kelsey, Bruce Schneier
Publication date: 17 June 1999
Title of this publication is not available (Why is that?)
Recommendations
Cited In (32)
- Luby-Rackoff backwards with more users and more security
- Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs
- Improved multi-user security using the squared-ratio method
- Equivalence between MAC, WCR and PRF for blockcipher based constructions
- Tight security of cascaded LRW2
- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
- Optimal forgeries against polynomial-based MACs and GCM
- A note on the chi-square method: a tool for proving cryptographic security
- Performance improvement for the GGM-construction of pseudorandom functions
- How to build optimally secure PRFs using block ciphers
- Quantum attacks on PRFs based on public random permutations
- Hardness preserving constructions of pseudorandom functions
- Keyed sum of permutations: a simpler RP-based PRF
- The sum of PRPs is a secure PRF
- Revisiting the indifferentiability of the sum of permutations
- How many queries are needed to distinguish a truncated random permutation from a random function?
- Beyond-birthday secure domain-preserving PRFs from a single permutation
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
- Analysis of the single-permutation encrypted Davies-Meyer construction
- Mind the composition: birthday bound attacks on EWCDMD and SoKAC21
- Leakage resilient value comparison with application to message authentication
- Proof of mirror theory for a wide range of \(\xi_{\max }\)
- Tight indistinguishability bounds for the XOR of independent random permutations by Fourier analysis
- Theory of Cryptography
- On the XOR of multiple random permutations
- Information-theoretic security with asymmetries
- A Generic Method to Design Modes of Operation Beyond the Birthday Bound
- Title not available (Why is that?)
- The summation-truncation hybrid: reusing discarded bits for free
- The advantage of truncated permutations
- On the streaming indistinguishability of a random permutation and a random function
- Multi-user security of the sum of truncated random permutations
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4249345)