Notions and relations for RKA-secure permutation and function families
From MaRDI portal
(Redirected from Publication:540472)
Recommendations
- scientific article; zbMATH DE number 2009976
- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers
- Pseudorandom functions and permutations provably secure against related-key attacks
- Cryptography secure against related-key attacks and tampering
- Improved constructions of PRFs secure against related-key attacks
Cites work
- scientific article; zbMATH DE number 1303117 (Why is no real title available?)
- scientific article; zbMATH DE number 1024009 (Why is no real title available?)
- scientific article; zbMATH DE number 1942411 (Why is no real title available?)
- scientific article; zbMATH DE number 2009976 (Why is no real title available?)
- scientific article; zbMATH DE number 1394311 (Why is no real title available?)
- A Related-Key Rectangle Attack on the Full KASUMI
- A Simple Related-Key Attack on the Full SHACAL-1
- Adavanced slide attacks
- Advances in Cryptology - CRYPTO 2003
- CHOSEN-KEY ATTACKS ON A BLOCK CIPHER
- Decorrelation: a theory for block cipher security
- Differential cryptanalysis of DES-like cryptosystems
- Fast Software Encryption
- Fast Software Encryption
- Fast Software Encryption
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- How to protect DES against exhaustive key search (an analysis of DESX).
- Information Security
- Information Security and Privacy
- Key-dependent S-boxes and differential cryptanalysis
- New Cryptanalytic Results on IDEA
- OMAC: one-key CBC MAC.
- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers
- On the construction of pseudorandom permutations: Luby-Rackoff revisited
- Progress in Cryptology - INDOCRYPT 2004
- Progress in Cryptology - INDOCRYPT 2004
- Related-Key Boomerang and Rectangle Attacks
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- Selected Areas in Cryptography
- The security of the cipher block chaining message authentication code
- Topics in Cryptology – CT-RSA 2004
- Topics in Cryptology – CT-RSA 2004
Cited in
(3)
This page was built for publication: Notions and relations for RKA-secure permutation and function families
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q540472)