메뉴 건너뛰기




Volumn 1880, Issue , 2000, Pages 376-393

On the round security of symmetric-key cryptographic primitives

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84974573774     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44598-6_24     Document Type: Conference Paper
Times cited : (36)

References (22)
  • 6
    • 84957068240 scopus 로고    scopus 로고
    • UMAC: Fast and secure message authentication
    • M. Wiener, editor, of Springer-Verlag, pages, August 1999. Full version can be found at
    • J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. UMAC: fast and secure message authentication. In M. Wiener, editor, Proc. CRYPTO99, volume 1666 of Springer-Verlag, pages 216-233, August 1999. Full version can be found at: http://www.cs.ucdavis.edu/˜rogaway/umac.
    • Proc. CRYPTO99 , vol.1666 , pp. 216-233
    • Black, J.1    Halevi, S.2    Krawczyk, H.3    Krovetz, T.4    Rogaway, P.5
  • 8
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • April
    • J. L. Carter and M. N. Wegman. Universal classes of hash functions. JCSS, 18(2):143-154, April 1979.
    • (1979) JCSS , vol.18 , Issue.2 , pp. 143-154
    • Carter, J.L.1    Wegman, M.N.2
  • 9
  • 10
    • 1942530977 scopus 로고    scopus 로고
    • A construction of a cipher from a single pseudorandom permutation
    • Summer
    • Shimon Even and Yishay Mansour. A construction of a cipher from a single pseudorandom permutation. Journal of Cryptology, 10(3):151-162, Summer 1997.
    • (1997) Journal of Cryptology , vol.10 , Issue.3 , pp. 151-162
    • Even, S.1    Mansour, Y.2
  • 11
    • 0001820140 scopus 로고
    • Cryptography and computer privacy
    • May
    • H. Feistel. Cryptography and computer privacy. Scientific American, 228(5):15-23, May 1973.
    • (1973) Scientific American , vol.228 , Issue.5 , pp. 15-23
    • Feistel, H.1
  • 12
  • 14
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations and pseudorandom functions
    • April
    • M. Luby and C. Rackoff. How to construct pseudorandom permutations and pseudorandom functions. SIAM J. Computing, 17(2):373-386, April 1988.
    • (1988) SIAM J. Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 15
    • 0003064824 scopus 로고    scopus 로고
    • On the construction of pseudo-random permutations: Luby-Rackoff revisited
    • Preliminary version in: Proc. STOC 97
    • M. Naor and O. Reingold. On the construction of pseudo-random permutations: Luby-Rackoff revisited. J. of Cryptology, 12:29-66, 1999. Preliminary version in: Proc. STOC 97.
    • (1999) J. Of Cryptology , vol.12 , pp. 29-66
    • Naor, M.1    Reingold, O.2
  • 16
    • 84974535028 scopus 로고    scopus 로고
    • FIPS publication 46: Data encryption standard, 1977. Federal Information Processing Standards Publication 46
    • National Bureau of Standards. FIPS publication 46: Data encryption standard, 1977. Federal Information Processing Standards Publication 46.
  • 17
    • 84974603111 scopus 로고    scopus 로고
    • Advanced encryption standard home page
    • National Institute of Standards and Technology. Advanced encryption standard home page. http://www.nist.gov/aes.
  • 20
    • 84957645558 scopus 로고
    • Bucket hashing and its application to fast message authentication
    • Springer-Verlag
    • P. Rogaway. Bucket hashing and its application to fast message authentication. In Proc. CRYPTO95, Lecture Notes in Computer Science. Springer-Verlag, 1995.
    • (1995) Proc. CRYPTO95, Lecture Notes in Computer Science
    • Rogaway, P.1
  • 22
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • June
    • Mark N. Wegman and J. Lawrence Carter. New hash functions and their use in authentication and set equality. JCSS, 22(3):265-279, June 1981.
    • (1981) JCSS , vol.22 , Issue.3 , pp. 265-279
    • Wegman, M.N.1    Lawrence Carter, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.