-
1
-
-
84957712839
-
Foiling birthday attacks in length-doubling transformations
-
Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
-
Aiello, W., Venkatesan, R.: Foiling birthday attacks in length-doubling transformations. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 307-320. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 307-320
-
-
Aiello, W.1
Venkatesan, R.2
-
2
-
-
34547363710
-
A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation
-
IEEE
-
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. A Concrete Security Treatment of Symmetric Encryption and appeared in the Proceedings of 38th Annual Symposium of Computer Science, IEEE (1997)
-
(1997)
A Concrete Security Treatment of Symmetric Encryption and appeared in the Proceedings of 38th Annual Symposium of Computer Science
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
4
-
-
70350655327
-
Characterization of Security Notions for Probabilistic
-
STOC
-
Katz, J., Yung, M.: Characterization of Security Notions for Probabilistic. In: Private-Key Encription - STOC 2000 (2000)
-
(2000)
Private-Key Encription
-
-
Katz, J.1
Yung, M.2
-
5
-
-
0037615417
-
Unforgeable Encryption and Chosen-Ciphertext-Secure Modes of Operation
-
Katz, J., Yung, M.: Unforgeable Encryption and Chosen-Ciphertext-Secure Modes of Operation. In: Fast Software Encryption 2000 (2000)
-
(2000)
Fast Software Encryption
-
-
Katz, J.1
Yung, M.2
-
6
-
-
0023984964
-
How to Construct Pseudorandom Permutations from Pseudorandom Functions
-
Luby, M., Rackoff, C.: How to Construct Pseudorandom Permutations from Pseudorandom Functions. SIAM J. Comput. 17(2), 373-386 (1988)
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
7
-
-
85048564026
-
A simplified and generalized treatment of luby-rackoff pseudorandom permutation generators
-
Rueppel, R.A, ed, EUROCRYPT 1992, Springer, Heidelberg
-
Maurer, U.M.: A simplified and generalized treatment of luby-rackoff pseudorandom permutation generators. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 239-255. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.658
, pp. 239-255
-
-
Maurer, U.M.1
-
8
-
-
84947240143
-
Indistinguishability of random systems
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
-
Maurer, U.M.: Indistinguishability of random systems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 100-132. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 100-132
-
-
Maurer, U.M.1
-
9
-
-
35248852881
-
The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations
-
Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
-
Maurer, U., Pietrzak, K.: The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 544-561. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 544-561
-
-
Maurer, U.1
Pietrzak, K.2
-
10
-
-
0003064824
-
On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited
-
Naor, M., Reingold, O.: On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited. J. Cryptology 12(1), 29-66 (1999)
-
(1999)
J. Cryptology
, vol.12
, Issue.1
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
11
-
-
0012077520
-
Pseudorandom Permutations based on the DES Scheme
-
Charpin, P, Cohen, G, eds, EUROCODE 1990, Springer, Heidelberg
-
Patarin, J.: Pseudorandom Permutations based on the DES Scheme. In: Charpin, P., Cohen, G. (eds.) EUROCODE 1990. LNCS, vol. 514, pp. 193-204. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.514
, pp. 193-204
-
-
Patarin, J.1
-
12
-
-
21144440670
-
Etude de Générateurs de Permutations Basés sur les Schémas du DES. Ph. Thesis
-
Inria, France
-
Patarin, J.: Etude de Générateurs de Permutations Basés sur les Schémas du DES. Ph. Thesis. Inria, Domaine de Voluceau, France (1991)
-
(1991)
Domaine de Voluceau
-
-
Patarin, J.1
-
13
-
-
85029478073
-
New results on pseudorandom permutation generators based on the DES scheme
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Patarin, J.: New results on pseudorandom permutation generators based on the DES scheme. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 301-312. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 301-312
-
-
Patarin, J.1
-
14
-
-
85034496745
-
How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function
-
Rueppel, R.A, ed, EUROCRYPT 1992, Springer, Heidelberg
-
Patarin, J.: How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 256-266. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.658
, pp. 256-266
-
-
Patarin, J.1
-
15
-
-
84946837966
-
Generic attacks on feistel schemes
-
Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
Patarin, J.: Generic attacks on feistel schemes. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 222-238. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 222-238
-
-
Patarin, J.1
-
16
-
-
35248853456
-
Luby-rackoff: 7 rounds are enough for formula image security
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Patarin, J.: Luby-rackoff: 7 rounds are enough for formula image security. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 513-529. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 513-529
-
-
Patarin, J.1
-
17
-
-
33745870780
-
On linear systems of equations with distinct variables and small block size
-
Won, D.H, Kim, S, eds, ICISC 2005, Springer, Heidelberg
-
Patarin, J.: On linear systems of equations with distinct variables and small block size. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 299-321. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3935
, pp. 299-321
-
-
Patarin, J.1
-
18
-
-
45449120455
-
A proof of security in O(2n)for the benes scheme
-
Vaudenay, S, ed, AFRICACRYPT 2008, Springer, Heidelberg
-
Patarin, J.: A proof of security in O(2n)for the benes scheme. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 209-220. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5023
, pp. 209-220
-
-
Patarin, J.1
-
19
-
-
54249127913
-
A proof of security in O(2n) for the xor of two random permutations
-
Safavi-Naini, R, ed, ICITS 2008, Springer, Heidelberg
-
Patarin, J.: A proof of security in O(2n) for the xor of two random permutations. In: Safavi-Naini, R. (ed.) ICITS 2008. LNCS, vol. 5155, pp. 232-248. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5155
, pp. 232-248
-
-
Patarin, J.1
-
21
-
-
77649244626
-
Generic attacks on unbalanced feistel schemes with contracting functions
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Patarin, J., Nachef, V., Berbain, C.: Generic attacks on unbalanced feistel schemes with contracting functions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 396-411. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 396-411
-
-
Patarin, J.1
Nachef, V.2
Berbain, C.3
-
22
-
-
38149067485
-
Generic attacks on unbalanced feistel schemes with expanding functions
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Patarin, J., Nachef, V., Berbain, C.: Generic attacks on unbalanced feistel schemes with expanding functions. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 325-341. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 325-341
-
-
Patarin, J.1
Nachef, V.2
Berbain, C.3
-
23
-
-
70350655326
-
Building Secure Block Ciphers on Generic Attacks Assumptions
-
Patarin, J., Seurin, Y.: Building Secure Block Ciphers on Generic Attacks Assumptions. In: SAC 2008 (2008)
-
(2008)
SAC
-
-
Patarin, J.1
Seurin, Y.2
-
24
-
-
0009799638
-
A Problem in Combinatorial Group Theory
-
Salzborn, F., Szekeres, G.: A Problem in Combinatorial Group Theory. Ars Combinatoria 7, 3-5 (1979)
-
(1979)
Ars Combinatoria
, vol.7
, pp. 3-5
-
-
Salzborn, F.1
Szekeres, G.2
-
25
-
-
84958955327
-
-
Schneier, B., Kelsey, J.: Unbalanced Feistel Networks and Block Cipher Design. In: Gollmann, D. (ed.) FSE 1996. LNCS, 1039, pp. 121-144. Springer, Heidelberg (1996)
-
Schneier, B., Kelsey, J.: Unbalanced Feistel Networks and Block Cipher Design. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 121-144. Springer, Heidelberg (1996)
-
-
-
|