scientific article; zbMATH DE number 2009979
From MaRDI portal
Publication:4434898
zbMath1038.94542MaRDI QIDQ4434898
Krzysztof Pietrzak, Ueli M. Maurer
Publication date: 26 November 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560544.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Analysis of algorithms and problem complexity (68Q25) Cryptography (94A60) Random number generation in numerical analysis (65C10)
Related Items (15)
The key-dependent message security of key-alternating Feistel ciphers ⋮ Optimum attack on 3-round Feistel-2 structure ⋮ Derandomized constructions of \(k\)-wise (almost) independent permutations ⋮ Beyond-birthday security for permutation-based Feistel networks ⋮ Beyond-birthday secure domain-preserving PRFs from a single permutation ⋮ A Proof of Security in O(2 n ) for the Benes Scheme ⋮ BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers ⋮ On Lai-Massey and quasi-Feistel ciphers ⋮ \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications ⋮ Deterministic encryption with the Thorp shuffle ⋮ Building blockcipher from small-block tweakable blockcipher ⋮ Building Secure Block Ciphers on Generic Attacks Assumptions ⋮ The “Coefficients H” Technique ⋮ Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal ⋮ A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
This page was built for publication: