Power of a Public Random Permutation and Its Application to Authenticated Encryption
From MaRDI portal
Publication:5281282
Cited in
(4)- Related-key almost universal hash functions: definitions, constructions and applications
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- Slidex attacks on the Even-Mansour encryption scheme
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code
This page was built for publication: Power of a Public Random Permutation and Its Application to Authenticated Encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5281282)