Pages that link to "Item:Q5418704"
From MaRDI portal
The following pages link to Tight Security Bounds for Key-Alternating Ciphers (Q5418704):
Displaying 7 items.
- How to build an ideal cipher: the indifferentiability of the Feistel construction (Q271585) (← links)
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour (Q306057) (← links)
- Key recovery attacks on iterated Even-Mansour encryption schemes (Q321305) (← links)
- On the resilience of Even-Mansour to invariant permutations (Q831175) (← links)
- Key alternating ciphers based on involutions (Q1744011) (← links)
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks (Q1749800) (← links)
- A Note on the Security Framework of Two-key DbHtS MACs (Q6487350) (← links)