-
1
-
-
84947904230
-
Foiling Birthday Attacks in Length-Doubling Transformations - Benes: A Non-Reversible Alternative to Feistel
-
Eurocrypt 96, Springer
-
William Aiollo, Ramarathnam Venkatesan, Foiling Birthday Attacks in Length-Doubling Transformations - Benes: A Non-Reversible Alternative to Feistel. Eurocrypt 96, LNCS 1070, Springer, pp. 307-320.
-
LNCS
, vol.1070
, pp. 307-320
-
-
Aiollo, W.1
Venkatesan, R.2
-
2
-
-
84944886613
-
Ciphers with Arbitrary Finite Domains
-
[RS]A'2002, February
-
John Black, Philip Rogaway, Ciphers with Arbitrary Finite Domains, [RS]A'2002, pp. 114-130, Springer LNCS 2271, February 2002.
-
(2002)
Springer LNCS
, vol.2271
, pp. 114-130
-
-
Black, J.1
Rogaway, P.2
-
3
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
April
-
M. Luby, C. Rackoff, How to construct pseudorandom permutations from pseudorandom functions, SIAM Journal on Computing, vol. 17, n. 2, pp. 373-386, April 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
4
-
-
24144501490
-
A simplified and generalized treatment of Luby-Rackoff pseudorandom permutation generators
-
Springer
-
U. Maurer, A simplified and generalized treatment of Luby-Rackoff pseudorandom permutation generators, Eurocrypt'92, Springer, pp. 239-255.
-
Eurocrypt'92
, pp. 239-255
-
-
Maurer, U.1
-
5
-
-
84947240143
-
Indistinguishability of Random Systems
-
, Eurocrypt 2002, Springer
-
U. Maurer: Indistinguishability of Random Systems, Eurocrypt 2002, LNCS 2332, Springer, pp. 110-132.
-
LNCS
, vol.2332
, pp. 110-132
-
-
Maurer, U.1
-
6
-
-
35248852881
-
The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations
-
Eurocrypt 2003, May Warsaw, Poland, Springer
-
U. Maurer, K. Pietrzak: The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations, Eurocrypt 2003, May 2003, Warsaw, Poland, LNCS, Springer.
-
(2003)
LNCS
-
-
Maurer, U.1
Pietrzak, K.2
-
7
-
-
0003064824
-
On the construction of pseudo-random permutations: Luby-Rackoff revisited
-
Moni Naor and Omer Reingold, On the construction of pseudo-random permutations: Luby-Rackoff revisited, Journal of Cryptology, vol 12, 1999, pp. 29-66.
-
(1999)
Journal of Cryptology
, vol.12
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
9
-
-
0012077520
-
Pseudorandom Permutations based on the DES Scheme
-
Eurocode'90, Springer
-
J. Patarin, Pseudorandom Permutations based on the DES Scheme, Eurocode'90, LNCS 514, Springer, pp. 193-204.
-
LNCS
, vol.514
, pp. 193-204
-
-
Patarin, J.1
-
10
-
-
85029478073
-
New results on pseudorandom permutation generators based on the DES scheme
-
Springer
-
J. Patarin, New results on pseudorandom permutation generators based on the DES scheme, Crypto'91, Springer, pp. 301-312.
-
Crypto'91
, pp. 301-312
-
-
Patarin, J.1
-
11
-
-
21144440670
-
-
Ph. D. Thesis, Inria, Domaine de Voluceau, Le Chesnay, France
-
J. Patarin, Etude des générateurs de permutations basés sur le schéma du DES Ph. D. Thesis, Inria, Domaine de Voluceau, Le Chesnay, France, 1991.
-
(1991)
Etude des Générateurs de Permutations Basés sur le Schéma du DES
-
-
Patarin, J.1
-
12
-
-
0842283872
-
How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function
-
Springer
-
J. Patarin, How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function. Eurocrypt'92, Springer, pp. 256-266.
-
Eurocrypt'92
, pp. 256-266
-
-
Patarin, J.1
-
14
-
-
84947932235
-
About Feistel Schemes with Six (or More) Rounds
-
J. Patarin, About Feistel Schemes with Six (or More) Rounds, in Fast Software Encryption 1998, pp. 103-121.
-
(1998)
Fast Software Encryption
, pp. 103-121
-
-
Patarin, J.1
-
15
-
-
84946837966
-
Generic Attacks on Feistel Schemes
-
Asiacrypt 2001, Springer
-
J. Patarin, Generic Attacks on Feistel Schemes, Asiacrypt 2001, LNCS 2248, Springer, pp. 222-238.
-
LNCS
, vol.2248
, pp. 222-238
-
-
Patarin, J.1
-
16
-
-
84855622543
-
-
Extended version of this paper. Available from the author.
-
n(1-ε) Security. Extended version of this paper. Available from the author.
-
n(1-ε) Security
-
-
Patarin, J.1
-
17
-
-
84957673485
-
Toward making Luby-Rackoff ciphers optimal and practical
-
FSE'99, Springer
-
S. Patel, Z. Ramzan and G. Sundaram, Toward making Luby-Rackoff ciphers optimal and practical, FSE'99, LNCS, Springer, 1999.
-
(1999)
LNCS
-
-
Patel, S.1
Ramzan, Z.2
Sundaram, G.3
-
18
-
-
85028843848
-
How to construct pseudorandom permutations from Single Pseudorandom Functions
-
Eurocrypt'90, Springer
-
J. Pieprzyk, How to construct pseudorandom permutations from Single Pseudorandom Functions, Eurocrypt'90, LNCS 473, Springer, pp. 140-150.
-
LNCS
, vol.473
, pp. 140-150
-
-
Pieprzyk, J.1
-
19
-
-
84974573774
-
On the Round Security of Symmetric-Key Cryptographic Primitives
-
Crypto 2000, Springer
-
Z. Ramzan, L. Reyzin, On the Round Security of Symmetric-Key Cryptographic Primitives, Crypto 2000, LNCS 1880, Springer, pp. 376-393.
-
LNCS
, vol.1880
, pp. 376-393
-
-
Ramzan, Z.1
Reyzin, L.2
-
20
-
-
84958955327
-
Unbalanced Feistel Networks and Block Cipher Design
-
FSE'96, Springer
-
B. Schneier and J. Kelsey, Unbalanced Feistel Networks and Block Cipher Design, FSE'96, LNCS 1039, Springer, pp. 121-144.
-
LNCS
, vol.1039
, pp. 121-144
-
-
Schneier, B.1
Kelsey, J.2
|