메뉴 건너뛰기




Volumn 5381 LNCS, Issue , 2008, Pages 328-345

The "coefficients H" technique

Author keywords

[No Author keywords available]

Indexed keywords

CIPHERTEXTS; PSEUDO RANDOM; PSEUDO-RANDOM PROPERTIES;

EID: 70350677135     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04159-4_21     Document Type: Conference Paper
Times cited : (194)

References (26)
  • 1
    • 84957712839 scopus 로고    scopus 로고
    • Foiling birthday attacks in length-doubling transformations
    • Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
    • Aiello, W., Venkatesan, R.: Foiling birthday attacks in length-doubling transformations. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 307-320. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1070 , pp. 307-320
    • Aiello, W.1    Venkatesan, R.2
  • 4
    • 70350655327 scopus 로고    scopus 로고
    • Characterization of Security Notions for Probabilistic
    • STOC
    • Katz, J., Yung, M.: Characterization of Security Notions for Probabilistic. In: Private-Key Encription - STOC 2000 (2000)
    • (2000) Private-Key Encription
    • Katz, J.1    Yung, M.2
  • 5
    • 0037615417 scopus 로고    scopus 로고
    • Unforgeable Encryption and Chosen-Ciphertext-Secure Modes of Operation
    • Katz, J., Yung, M.: Unforgeable Encryption and Chosen-Ciphertext-Secure Modes of Operation. In: Fast Software Encryption 2000 (2000)
    • (2000) Fast Software Encryption
    • Katz, J.1    Yung, M.2
  • 6
    • 0023984964 scopus 로고
    • How to Construct Pseudorandom Permutations from Pseudorandom Functions
    • Luby, M., Rackoff, C.: How to Construct Pseudorandom Permutations from Pseudorandom Functions. SIAM J. Comput. 17(2), 373-386 (1988)
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 7
    • 85048564026 scopus 로고
    • A simplified and generalized treatment of luby-rackoff pseudorandom permutation generators
    • Rueppel, R.A, ed, EUROCRYPT 1992, Springer, Heidelberg
    • Maurer, U.M.: A simplified and generalized treatment of luby-rackoff pseudorandom permutation generators. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 239-255. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.658 , pp. 239-255
    • Maurer, U.M.1
  • 8
    • 84947240143 scopus 로고    scopus 로고
    • Indistinguishability of random systems
    • Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
    • Maurer, U.M.: Indistinguishability of random systems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 100-132. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 100-132
    • Maurer, U.M.1
  • 9
    • 35248852881 scopus 로고    scopus 로고
    • The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations
    • Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
    • Maurer, U., Pietrzak, K.: The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 544-561. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 544-561
    • Maurer, U.1    Pietrzak, K.2
  • 10
    • 0003064824 scopus 로고    scopus 로고
    • On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited
    • Naor, M., Reingold, O.: On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited. J. Cryptology 12(1), 29-66 (1999)
    • (1999) J. Cryptology , vol.12 , Issue.1 , pp. 29-66
    • Naor, M.1    Reingold, O.2
  • 11
    • 0012077520 scopus 로고
    • Pseudorandom Permutations based on the DES Scheme
    • Charpin, P, Cohen, G, eds, EUROCODE 1990, Springer, Heidelberg
    • Patarin, J.: Pseudorandom Permutations based on the DES Scheme. In: Charpin, P., Cohen, G. (eds.) EUROCODE 1990. LNCS, vol. 514, pp. 193-204. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.514 , pp. 193-204
    • Patarin, J.1
  • 12
    • 21144440670 scopus 로고
    • Etude de Générateurs de Permutations Basés sur les Schémas du DES. Ph. Thesis
    • Inria, France
    • Patarin, J.: Etude de Générateurs de Permutations Basés sur les Schémas du DES. Ph. Thesis. Inria, Domaine de Voluceau, France (1991)
    • (1991) Domaine de Voluceau
    • Patarin, J.1
  • 13
    • 85029478073 scopus 로고
    • New results on pseudorandom permutation generators based on the DES scheme
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Patarin, J.: New results on pseudorandom permutation generators based on the DES scheme. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 301-312. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 301-312
    • Patarin, J.1
  • 14
    • 85034496745 scopus 로고
    • How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function
    • Rueppel, R.A, ed, EUROCRYPT 1992, Springer, Heidelberg
    • Patarin, J.: How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 256-266. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.658 , pp. 256-266
    • Patarin, J.1
  • 15
    • 84946837966 scopus 로고    scopus 로고
    • Generic attacks on feistel schemes
    • Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
    • Patarin, J.: Generic attacks on feistel schemes. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 222-238. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 222-238
    • Patarin, J.1
  • 16
    • 35248853456 scopus 로고    scopus 로고
    • Luby-rackoff: 7 rounds are enough for formula image security
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Patarin, J.: Luby-rackoff: 7 rounds are enough for formula image security. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 513-529. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 513-529
    • Patarin, J.1
  • 17
    • 33745870780 scopus 로고    scopus 로고
    • On linear systems of equations with distinct variables and small block size
    • Won, D.H, Kim, S, eds, ICISC 2005, Springer, Heidelberg
    • Patarin, J.: On linear systems of equations with distinct variables and small block size. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 299-321. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3935 , pp. 299-321
    • Patarin, J.1
  • 18
    • 45449120455 scopus 로고    scopus 로고
    • A proof of security in O(2n)for the benes scheme
    • Vaudenay, S, ed, AFRICACRYPT 2008, Springer, Heidelberg
    • Patarin, J.: A proof of security in O(2n)for the benes scheme. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 209-220. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5023 , pp. 209-220
    • Patarin, J.1
  • 19
    • 54249127913 scopus 로고    scopus 로고
    • A proof of security in O(2n) for the xor of two random permutations
    • Safavi-Naini, R, ed, ICITS 2008, Springer, Heidelberg
    • Patarin, J.: A proof of security in O(2n) for the xor of two random permutations. In: Safavi-Naini, R. (ed.) ICITS 2008. LNCS, vol. 5155, pp. 232-248. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5155 , pp. 232-248
    • Patarin, J.1
  • 21
    • 77649244626 scopus 로고    scopus 로고
    • Generic attacks on unbalanced feistel schemes with contracting functions
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Patarin, J., Nachef, V., Berbain, C.: Generic attacks on unbalanced feistel schemes with contracting functions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 396-411. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 396-411
    • Patarin, J.1    Nachef, V.2    Berbain, C.3
  • 22
    • 38149067485 scopus 로고    scopus 로고
    • Generic attacks on unbalanced feistel schemes with expanding functions
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Patarin, J., Nachef, V., Berbain, C.: Generic attacks on unbalanced feistel schemes with expanding functions. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 325-341. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 325-341
    • Patarin, J.1    Nachef, V.2    Berbain, C.3
  • 23
    • 70350655326 scopus 로고    scopus 로고
    • Building Secure Block Ciphers on Generic Attacks Assumptions
    • Patarin, J., Seurin, Y.: Building Secure Block Ciphers on Generic Attacks Assumptions. In: SAC 2008 (2008)
    • (2008) SAC
    • Patarin, J.1    Seurin, Y.2
  • 24
    • 0009799638 scopus 로고
    • A Problem in Combinatorial Group Theory
    • Salzborn, F., Szekeres, G.: A Problem in Combinatorial Group Theory. Ars Combinatoria 7, 3-5 (1979)
    • (1979) Ars Combinatoria , vol.7 , pp. 3-5
    • Salzborn, F.1    Szekeres, G.2
  • 25
    • 84958955327 scopus 로고    scopus 로고
    • Schneier, B., Kelsey, J.: Unbalanced Feistel Networks and Block Cipher Design. In: Gollmann, D. (ed.) FSE 1996. LNCS, 1039, pp. 121-144. Springer, Heidelberg (1996)
    • Schneier, B., Kelsey, J.: Unbalanced Feistel Networks and Block Cipher Design. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 121-144. Springer, Heidelberg (1996)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.