-
1
-
-
0018456171
-
Universal classes of hash functions
-
J.L. Carter and M.N. Wegman. Universal classes of hash functions. JCSS, vol. 18, No. 2, pages 143–154, 1979.
-
(1979)
JCSS
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
2
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
April
-
M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput., vol. 17, No. 2, pages 373–386, April 1988.
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
3
-
-
51849100070
-
Faster Luby-Rackoff ciphers
-
LNCS, 1039, Springer-Verlag
-
S. Lucks. Faster Luby-Rackoff ciphers. Fast Software Encryption, FSE’96, LNCS 1039, pages 189–203, Springer-Verlag.
-
Fast Software Encryption, FSE’96
, pp. 189-203
-
-
Lucks, S.1
-
4
-
-
35048878011
-
New structure of block ciphers with provable security against differential and linear cryptanalysis
-
LNCS, 1039, Springer-Verlag
-
M. Matsui. New structure of block ciphers with provable security against differential and linear cryptanalysis. Fast Software Encryption, FSE’96, LNCS 1039, pages 206–218, Springer-Verlag.
-
Fast Software Encryption, FSE’96
, pp. 206-218
-
-
Matsui, M.1
-
5
-
-
84947904428
-
New block encryption algorithm MISTY
-
LNCS, 1267, Springer-Verlag
-
M. Matsui. New block encryption algorithm MISTY. Fast Software Encryption, FSE’97, LNCS 1267, pages 54–68, Springer-Verlag.
-
Fast Software Encryption, FSE’97
, pp. 54-68
-
-
Matsui, M.1
-
6
-
-
0003064824
-
On the construction of pseudorandom permutations: Luby-Rackoff revised
-
Springer-Verlag
-
M. Naor and O. Reingold. On the construction of pseudorandom permutations: Luby-Rackoff revised. J. Cryptology, vol. 12, No. 1, pages 29–66, Springer-Verlag, 1999.
-
(1999)
J. Cryptology
, vol.12
, Issue.1
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
7
-
-
0029632010
-
Provable security against a differential attacks
-
Springer-Verlag
-
K. Nyberg and L.R. Knudsen. Provable security against a differential attacks. J. Cryptology, vol. 8, No. 1, pages 27–37, Springer-Verlag, 1995.
-
(1995)
J. Cryptology
, vol.8
, Issue.1
, pp. 27-37
-
-
Nyberg, K.1
Knudsen, L.R.2
-
8
-
-
0012077520
-
Pseudorandom permutations based on the DES scheme
-
LNCS 514, Springer-Verlag
-
J. Patarin. Pseudorandom permutations based on the DES scheme. Proceedings of Eurocode’90, LNCS 514, pages 193–204, Springer-Verlag, 1990.
-
(1990)
Proceedings of Eurocode’90
, pp. 193-204
-
-
Patarin, J.1
-
9
-
-
85029478073
-
New results of pseudorandom permutation generators based on the DES scheme
-
LNCS, 576, Springer-Verlag
-
J. atarin. New results of pseudorandom permutation generators based on the DES scheme. Advances in Cryptology — CRYPTO’91, LNCS 576, pages 301–312, Springer-Verlag, 1991.
-
(1991)
Advances in Cryptology — CRYPTO’91
, pp. 301-312
-
-
Atarin, J.1
-
10
-
-
84974573774
-
On the round security of symmetric-key cryptographic primitives
-
LNCS, 1880, Springer-Verlag
-
Z. Ramzan and L. Reyzin. On the round security of symmetric-key cryptographic primitives. Advances in Cryptology — CRYPTO 2000, LNCS 1880, pages 376–393, Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology — CRYPTO 2000
, pp. 376-393
-
-
Ramzan, Z.1
Reyzin, L.2
-
11
-
-
0030686751
-
On non-pseudorandomness from block ciphers with provable immunity against linear cryptanalysis
-
April
-
K. Sakurai and Y. Zheng. On non-pseudorandomness from block ciphers with provable immunity against linear cryptanalysis. IEICE Trans. fundamentals, vol. E80-A, No. 1, pages 19–24, April 1997.
-
(1997)
IEICE Trans. Fundamentals
, vol.80
, Issue.1
, pp. 19-24
-
-
Sakurai, K.1
Zheng, Y.2
-
12
-
-
0012022898
-
Pseudorandomness of a block cipher MISTY
-
ISEC 96-9
-
M. Sugita. Pseudorandomness of a block cipher MISTY. Technicalr eport of IEICE, ISEC 96-9, pages 13–21, 1996.
-
(1996)
Technicalr Eport of IEICE
, pp. 13-21
-
-
Sugita, M.1
-
13
-
-
85027103665
-
Pseudorandomness of block ciphers MISTY1
-
ISEC 97-19
-
M. Sugita. Pseudorandomness of block ciphers MISTY1. Technicalr eport of IEICE, ISEC 97-19, pages 53–64, 1997.
-
(1997)
Technicalr Eport of IEICE
, pp. 53-64
-
-
Sugita, M.1
-
14
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M.N. Wegman and J.L. Carter. New hash functions and their use in authentication and set equality. JCSS, vol. 22, No. 3, pages 265–279, 1981.
-
(1981)
JCSS
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|