-
1
-
-
33745865955
-
High-speed pseudorandom number generation with small memory
-
LNCS 1636
-
W. Aiello, S. Rajagopalan, and R. Venkatesan. "High-speed Pseudorandom Number Generation with Small Memory." Fast Software Encryption, FSE'99, LNCS 1636, pp. 290-304, 1999.
-
(1999)
Fast Software Encryption, FSE'99
, pp. 290-304
-
-
Aiello, W.1
Rajagopalan, S.2
Venkatesan, R.3
-
2
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. "A Concrete Security Treatment of Symmetric Encryption." Proceedings of the 38th Annual Symposium on Foundations of Computer Science, FOCS '97, pp. 394-403, 1997.
-
(1997)
Proceedings of the 38th Annual Symposium on Foundations of Computer Science, FOCS '97
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
4
-
-
33745828152
-
Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security
-
LNCS 2442
-
I. Damgård and J. Nielsen. "Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security." Advances in Cryptology-CRYPTO'02, LNCS 2442, pp. 449-464, 2002.
-
(2002)
Advances in Cryptology-CRYPTO'02
, pp. 449-464
-
-
Damgård, I.1
Nielsen, J.2
-
5
-
-
0242571716
-
The security of One-block-to-many modes of operation
-
LNCS 2887
-
H. Gilbert. "The Security of "One-Block-to-Many" Modes of Operation." Fast Software Encryption, FSE'03, LNCS 2887, pp. 377-395, 2003.
-
(2003)
Fast Software Encryption, FSE'03
, pp. 377-395
-
-
Gilbert, H.1
-
6
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser, and S. Micali. "How to Construct Random Functions." Journal of the ACM, vol.33, no.4, pp. 792-807, 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
8
-
-
0023984964
-
How to construct pseudo-random permutations from pseudo-random functions
-
M. Luby and C. Rackoff. "How to Construct Pseudo-random Permutations from Pseudo-random functions." SIAM J. Computing, vol.17, no.2, pp. 373-386, 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
9
-
-
0027308007
-
Cascade ciphers: The importance of being first
-
U. Maurer and J. L. Massey. "Cascade Ciphers: The Importance of Being First." J. Cryptology vol.6, no.1, pp. 55-61, 1993.
-
(1993)
J. Cryptology
, vol.6
, Issue.1
, pp. 55-61
-
-
Maurer, U.1
Massey, J.L.2
-
10
-
-
84947240143
-
Indistinguishability of random systems
-
LNCS 2332
-
U. Maurer. "Indistinguishability of Random Systems." Advances in Cryptology-EUROCRYPT'02, LNCS 2332, pp. 110-132, 2002.
-
(2002)
Advances in Cryptology, EUROCRYPT'02
, pp. 110-132
-
-
Maurer, U.1
-
11
-
-
26944444779
-
Composition of random systems: When two weak make one strong
-
LNCS 2951
-
U. Maurer and K. Pietrzak. "Composition of Random Systems: When Two Weak Make One Strong." Theory of Cryptography - TCC'04, LNCS 2951, pp. 410-427, 2004.
-
(2004)
Theory of Cryptography- TCC'04
, pp. 410-427
-
-
Maurer, U.1
Pietrzak, K.2
-
13
-
-
84957617971
-
From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs
-
LNCS 1462
-
M. Naor and O. Reingold. "From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract)." Advances in Cryptology - CRYPTO'98, LNCS 1462, pp. 267-282, 1998.
-
(1998)
Advances in Cryptology - CRYPTO'98
, pp. 267-282
-
-
Naor, M.1
Reingold, O.2
-
14
-
-
0003064824
-
On the construction of pseudorandom permutations: Luby-rackoff revisited
-
M. Naor and O. Reingold. "On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited." Journal of Cryptology, vol. 12(1), pp. 29-66, 1999.
-
(1999)
Journal of Cryptology
, vol.12
, Issue.1
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
15
-
-
0032647187
-
Synthesizers and their application to the parallel construction of pseudo-random functions
-
M. Naor and O. Reingold. "Synthesizers and their application to the parallel construction of pseudo-random functions." J. of Computer and Systems Sciences, Vol. 58(2), pp. 336-375, 1999.
-
(1999)
J. of Computer and Systems Sciences
, vol.58
, Issue.2
, pp. 336-375
-
-
Naor, M.1
Reingold, O.2
-
18
-
-
84941164341
-
-
http://www.nlanr.net/NA/Learn/packetsizes.html
-
-
-
|