scientific article; zbMATH DE number 2079924
From MaRDI portal
Publication:4472069
zbMATH Open1045.68561MaRDI QIDQ4472069FDOQ4472069
Authors: John Black, Phillip Rogaway
Publication date: 3 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2271/22710114.htm
Title of this publication is not available (Why is that?)
Recommendations
Cited In (30)
- Related-key analysis of generalized Feistel networks with expanding round functions
- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
- EC2C-PAKA: an efficient client-to-client password-authenticated key agreement
- Reverse cycle walking and its applications
- Modifying an enciphering scheme after deployment
- How to build an ideal cipher: the indifferentiability of the Feistel construction
- Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption
- Private information retrieval using trusted hardware
- Provable related-key security of contracting Feistel networks
- Deterministic encryption with the Thorp shuffle
- An efficient format-preserving encryption mode for practical domains
- SPF: a new family of efficient format-preserving encryption algorithms
- Format-preserving encryption: a survey
- Targeted invertible pseudorandom functions and deterministic format-transforming encryption
- Enciphering with Arbitrary Small Finite Domains
- Randomized half-ideal cipher on groups with applications to UC (a)PAKE
- Towards minimizing tweakable blockcipher-based generalized Feistel networks
- Pseudorandom functions: three decades later
- Improved domain extender for the ideal cipher
- FAST: secure and high performance format-preserving encryption and tokenization
- Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
- Several proofs of security for a tokenization algorithm
- Targeted ciphers for format-preserving encryption
- Format-preserving encryption algorithms using families of tweakable blockciphers
- Derandomized constructions of \(k\)-wise (almost) independent permutations
- Three third generation attacks on the format preserving encryption scheme FF3
- Linear cryptanalysis of FF3-1 and FEA
- Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes
- CDPS: a cryptographic data publishing system
- Security analysis of a password-based authentication protocol proposed to IEEE 1363
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4472069)