Modifying an Enciphering Scheme After Deployment
From MaRDI portal
Publication:5267416
DOI10.1007/978-3-319-56614-6_17zbMATH Open1415.94435OpenAlexW2600380372MaRDI QIDQ5267416FDOQ5267416
Thomas Ristenpart, Yuval Yarom, Paul Grubbs
Publication date: 13 June 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-56614-6_17
Cites Work
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Title not available (Why is that?)
- Title not available (Why is that?)
- The tail of the hypergeometric distribution
- Topics in Cryptology – CT-RSA 2006
- Format-Preserving Encryption
- The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries
Cited In (2)
Uses Software
This page was built for publication: Modifying an Enciphering Scheme After Deployment
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5267416)