scientific article; zbMATH DE number 1559534
From MaRDI portal
Publication:4526982
zbMATH Open0968.68115MaRDI QIDQ4526982FDOQ4526982
Authors: Moni Naor, Omer Reingold
Publication date: 28 February 2001
Title of this publication is not available (Why is that?)
Recommendations
- On the construction of pseudorandom permutations: Luby-Rackoff revisited
- Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme
- scientific article; zbMATH DE number 2009979
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- scientific article; zbMATH DE number 177029
Cited In (23)
- Hierarchical Identity-Based Encryption with Tight Multi-challenge Security
- Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme
- Title not available (Why is that?)
- Permutation graphs, fast forward permutations, and sampling the cycle structure of a permutation
- Title not available (Why is that?)
- On the Use of Interconnection Networks in Cryptography
- About Feistel schemes with six (or more) rounds
- Title not available (Why is that?)
- Structures and lower bounds for binary covering arrays
- Quick trickle permutation based on quick trickle characteristic sequence
- Title not available (Why is that?)
- Constructing pseudo-random permutations with a prescribed structure
- Encryption modes with almost free message integrity
- Title not available (Why is that?)
- A Proof of Security in O(2 n ) for the Benes Scheme
- Title not available (Why is that?)
- The security of Feistel ciphers with six rounds or less
- A combinatorial approach to quantum random functions
- Title not available (Why is that?)
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Tightly secure hierarchical identity-based encryption
- Title not available (Why is that?)
- Theory of Cryptography
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4526982)