-
1
-
-
84983089516
-
The security of cipher block chaining
-
Yvo G. Desmedt, editor, Advances in Cryptology - CRYPTO '94, Springer-Verlag, 21-25 August
-
M. Bellare, J. Kilian, and P. Rogaway. The security of cipher block chaining. In Yvo G. Desmedt, editor, Advances in Cryptology - CRYPTO '94, volume 839 of Lecture Notes in Computer Science, pages 341-358. Springer-Verlag, 21-25 August 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 341-358
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
2
-
-
84968518238
-
Factoring polynomials over large finite fields
-
E. R. Berlekamp. Factoring polynomials over large finite fields. Mathematics of Computation, 24:713-735, 1970.
-
(1970)
Mathematics of Computation
, vol.24
, pp. 713-735
-
-
Berlekamp, E.R.1
-
5
-
-
84942512232
-
Square hash: Fast message authentication via optimized universal hash functions
-
Proc. CRYPTO 99, Springer-Verlag
-
M. Etzel, S. Patel, and Z. Ramzan. Square hash: Fast message authentication via optimized universal hash functions. In Proc. CRYPTO 99, Lecture Notes in Computer Science. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
-
-
Etzel, M.1
Patel, S.2
Ramzan, Z.3
-
7
-
-
0022793132
-
How to construct random functions
-
October
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. Journal of the ACM, 33(4):792-807, October 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
10
-
-
0023984964
-
How to construct pseudorandom permutations and pseudorandom functions
-
April
-
M. Luby and C. Rackoff. How to construct pseudorandom permutations and pseudorandom functions. SIAM J. Computing, 17(2):373-386, April 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
11
-
-
0003064824
-
On the construction of pseudo-random permutations: Luby-Rackoff revisited
-
M. Naor and O. Reingold. On the construction of pseudo-random permutations: Luby-Rackoff revisited. J. of Cryptology, 12:29-66, 1999.
-
(1999)
J. of Cryptology
, vol.12
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
12
-
-
35248895947
-
-
Preliminary version
-
Preliminary version in: Proc. STOC 97.
-
Proc. STOC 97
-
-
-
13
-
-
0012023707
-
New results on pseudorandom permutation generators based on the des scheme
-
Proc. CRYPTO 91, Springer-Verlag
-
J. Patarin. New results on pseudorandom permutation generators based on the DES scheme. In Proc. CRYPTO 91, Lecture Notes in Computer Science. Springer-Verlag, 1991.
-
(1991)
Lecture Notes in Computer Science
-
-
Patarin, J.1
-
15
-
-
84957673485
-
Towards making Luby-Rackoff ciphers optimal and practical
-
Proc. Fast Software Encryption 99, Springer-Verlag
-
S. Patel, Z. Ramzan, and G. Sundaram. Towards making Luby-Rackoff ciphers optimal and practical. In Proc. Fast Software Encryption 99, Lecture Notes in Computer Science. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
-
-
Patel, S.1
Ramzan, Z.2
Sundaram, G.3
-
16
-
-
35248849007
-
On the security of Schnorr's pseudo random generator
-
Proc. EUROCRYPT 89, Springer-Verlag
-
R. A. Rueppel. On the security of Schnorr's pseudo random generator. In Proc. EUROCRYPT 89, Lecture Notes in Computer Science. Springer-Verlag, 1989.
-
(1989)
Lecture Notes in Computer Science
-
-
Rueppel, R.A.1
-
18
-
-
0842305625
-
Impossibility and optimality results on constructing pseudorandom permutations
-
Proc. EUROCRYPT 89, Springer-Verlag
-
Y. Zheng, T. Matsumoto, and H. Imai. Impossibility and optimality results on constructing pseudorandom permutations. In Proc. EUROCRYPT 89, Lecture Notes in Computer Science. Springer-Verlag, 1989.
-
(1989)
Lecture Notes in Computer Science
-
-
Zheng, Y.1
Matsumoto, T.2
Imai, H.3
|