Power of a Public Random Permutation and Its Application to Authenticated Encryption
From MaRDI portal
Publication:5281282
DOI10.1109/TIT.2010.2059636zbMATH Open1366.94555OpenAlexW2097015047WikidataQ122732795 ScholiaQ122732795MaRDI QIDQ5281282FDOQ5281282
Authors: Kaoru Kurosawa
Publication date: 27 July 2017
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tit.2010.2059636
Cited In (4)
- Related-key almost universal hash functions: definitions, constructions and applications
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
- Slidex attacks on the Even-Mansour encryption scheme
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code
This page was built for publication: Power of a Public Random Permutation and Its Application to Authenticated Encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5281282)