|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 24 occurrences of 19 keywords
|
|
|
Results
Found 55 publication records. Showing 55 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
191 | Rüdiger Weis, Stefan Lucks |
Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECMAST ![In: Multimedia Applications, Services and Techniques - ECMAST'99, 4th European Conference, Madrid, Spain, May 1999, Proceedings, pp. 456-471, 1999, Springer, 3-540-66082-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Luby-Rackoff ciphers, BEAR, LION, BEAST, JAVA, Performance, block cipher |
169 | Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram |
Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers, pp. 271-290, 2002, Springer, 3-540-00622-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
162 | Ueli M. Maurer |
A Simplified and Generalized Treatment of Luby-Rackoff Pseudorandom Permutation Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992, Proceedings, pp. 239-255, 1992, Springer, 3-540-56413-6. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
Locally random function, Luby-Rackoff permutation generator, Pseudorandom function, Pseudorandom permutation |
117 | Yevgeniy Dodis, Prashant Puniya |
On the Relation Between the Ideal Cipher and the Random Oracle Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, pp. 184-206, 2006, Springer, 3-540-32731-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
111 | David Goldenberg, Susan Hohenberger, Moses D. Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu |
On Tweaking Luby-Rackoff Blockciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 342-356, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
111 | Gilles Piret |
Luby-Rackoff Revisited: On the Use of Permutations as Inner Functions of a Feistel Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 39(2), pp. 233-245, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
111 | Gilles Piret, Jean-Jacques Quisquater |
Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers, pp. 100-113, 2004, Springer, 3-540-24327-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
111 | Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram |
Towards Making Luby-Rackoff Ciphers Optimal and Practical. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings, pp. 171-185, 1999, Springer, 3-540-66226-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
110 | Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung |
Threshold and Proactive Pseudo-Random Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, pp. 542-560, 2006, Springer, 3-540-32731-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Distributed Block Ciphers, Distributed Luby-Rackoff Construction, Oblivious Pseudo-Random Functions, Threshold Cryptography |
88 | Jacques Patarin |
About Feistel Schemes with Six (or More) Rounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 5th International Workshop, FSE '98, Paris, France, March 23-25, 1998, Proceedings, pp. 103-121, 1998, Springer, 3-540-64265-X. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
88 | Josef Pieprzyk, Babak Sadeghiyan |
Optima Perfect Randomizers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings, pp. 225-236, 1991, Springer, 3-540-57332-1. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
88 | Josef Pieprzyk, Reihaneh Safavi-Naini |
Randomized Authentication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, pp. 472-481, 1991, Springer, 3-540-54620-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
81 | Jacques Patarin, Valérie Nachef, Côme Berbain |
Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 396-411, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
unbalanced Feistel permutations, generic attacks, Luby-Rackoff theory, block ciphers, pseudo-random permutations |
81 | Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson |
ManTiCore: Encryption with Joint Cipher-State Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 440-453, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher |
81 | Jacques Patarin |
Generic Attacks on Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 222-238, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Feistel permutations, generic attacks on encryption schemes, Luby-Rackoff theory, pseudo-random permutations |
59 | Henri Gilbert |
The Security of "One-Block-to-Many" Modes of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 376-395, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
59 | Henri Gilbert, Marine Minier |
New Results on the Pseudorandomness of Some Blockcipher Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers, pp. 248-266, 2001, Springer, 3-540-43869-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
59 | Jacques Patarin |
New Results on Pseudorandom Permutation Generators Based on the DES Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings, pp. 301-312, 1991, Springer, 3-540-55188-3. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
52 | Cuong Nguyen, Anh Nguyen, Long Nguyen, Phong Trieu, Lai Tran |
Analysis of a New Practical SPN-Based Scheme in the Luby-Rackoff Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDSE (CCIS Volume) ![In: Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications - 9th International Conference, FDSE 2022, Ho Chi Minh City, Vietnam, November 23-25, 2022, Proceedings, pp. 210-224, 2022, Springer, 978-981-19-8068-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
52 | Ritam Bhaumik, Mridul Nandi, Anik Raychaudhuri |
Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 89(10), pp. 2255-2281, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
52 | Srimanta Bhattacharya, Mridul Nandi |
Luby-Rackoff Backwards with More Users and More Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (3) ![In: Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part III, pp. 345-375, 2021, Springer, 978-3-030-92077-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
52 | Akinori Hosoyamada, Tetsu Iwata |
Tight Quantum Security Bound of the 4-Round Luby-Rackoff Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 243, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
52 | Akinori Hosoyamada, Tetsu Iwata |
4-Round Luby-Rackoff Construction is a qPRP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (1) ![In: Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part I, pp. 145-174, 2019, Springer, 978-3-030-34577-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
52 | Kamel Mohamed Faraoun |
On the semantic security of cellular automata based pseudo-random permutation using results from the Luby-Rackoff construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. UMCS Informatica ![In: Ann. UMCS Informatica 15(1), pp. 21-31, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
52 | Lars R. Knudsen |
Luby-Rackoff Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 736-737, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
52 | |
Exponential attacks on 6-round Luby-Rackoff and on 5-round Lai-Massey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 15, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
52 | Mridul Nandi |
The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings, pp. 82-97, 2010, Springer, 978-3-642-17400-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
52 | David Goldenberg, Susan Hohenberger, Moses D. Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu |
On Tweaking Luby-Rackoff Blockciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 350, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
52 | Yassin M. Y. Hasan |
YC: A Luby-Rackoff ciphers family driven by pseudorandom vector/matrix transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSPA ![In: 9th International Symposium on Signal Processing and Its Applications, ISSPA 2007, Sharjah, United Arab Emirates, February 12-15, 2007, pp. 1-4, 2007, IEEE, 1-4244-0779-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Ueli Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin |
Luby-Rackoff Ciphers from Weak Round Functions? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 213, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
52 | Ueli M. Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin |
Luby-Rackoff Ciphers from Weak Round Functions? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings, pp. 391-408, 2006, Springer, 3-540-34546-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Lars R. Knudsen |
Luby-Rackoff Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Tetsu Iwata, Kaoru Kurosawa |
On the Universal Hash Functions in Luby-Rackoff Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1), pp. 60-66, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
52 | Ueli M. Maurer, Krzysztof Pietrzak |
The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 544-561, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
52 | Jacques Patarin |
Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 513-529, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
52 | Tetsu Iwata, Kaoru Kurosawa |
On the Universal Hash Functionsin Luby-Rackoff Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 226-236, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Block/Stream Ciphers, Provable Security, Cryptographic Primitives |
52 | Zulfikar Ramzan |
A study of Luby-Rackoff ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2001 |
RDF |
|
52 | Moni Naor, Omer Reingold |
On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 12(1), pp. 29-66, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
52 | Don Coppersmith |
Attacking Four-Round Luby-Rackoff Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptologia ![In: Cryptologia 22(3), pp. 266-278, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
52 | Mihir Bellare, Ted Krovetz, Phillip Rogaway |
Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertible. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 266-280, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
52 | Moni Naor, Omer Reingold |
On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Colloquium Comput. Complex. ![In: Electron. Colloquium Comput. Complex. TR97, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
52 | Moni Naor, Omer Reingold |
On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, El Paso, Texas, USA, May 4-6, 1997, pp. 189-199, 1997, ACM, 0-89791-888-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
52 | Moni Naor, Omer Reingold |
On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 1996, pp. 11, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
52 | Stefan Lucks |
Faster Luby-Rackoff Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings, pp. 189-203, 1996, Springer, 3-540-60865-6. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
51 | Jacques Patarin |
A Proof of Security in O(2n) for the Xor of Two Random Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITS ![In: Information Theoretic Security, Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings, pp. 232-248, 2008, Springer, 978-3-540-85092-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security beyond the birthday bound, Luby-Rackoff backwards, Pseudorandom functions, pseudorandom permutations |
51 | Atsushi Mitsuda, Tetsu Iwata |
Tweakable Pseudorandom Permutation from Generalized Feistel Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 22-37, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Luby-Rackoff theory, generalized Feistel structure, security proofs, tweakable blockcipher |
29 | Yassin M. Hasan |
From stream to provably secure block ciphers based on pseudorandom matrix transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), January 5-10, 2008, Bangalore, India, pp. 260-265, 2008, IEEE, 978-1-4244-1797-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin |
The Random Oracle Model and the Ideal Cipher Model Are Equivalent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 1-20, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Yevgeniy Dodis, Prashant Puniya |
Feistel Networks Made Public, and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings, pp. 534-554, 2007, Springer, 978-3-540-72539-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Verifiable Random Functions/Permutations, PRFs, PRPs, MACs, Domain Extension, Feistel Network |
29 | Serge Vaudenay |
Decorrelation: A Theory for Block Cipher Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 16(4), pp. 249-286, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block ciphers, Pseudorandomness |
29 | Zulfikar Ramzan, Leonid Reyzin |
On the Round Security of Symmetric-Key Cryptographic Primitives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, pp. 376-393, 2000, Springer, 3-540-67907-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
29 | John Kelsey, Bruce Schneier |
Key-Schedule Cryptanalysis of DEAL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings, pp. 118-134, 1999, Springer, 3-540-67185-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
29 | Serge Vaudenay |
Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings, pp. 49-61, 1999, Springer, 3-540-67185-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
29 | Reihaneh Safavi-Naini |
Feistel Type Authentication Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings, pp. 170-178, 1991, Springer, 3-540-57332-1. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
29 | Claus-Peter Schnorr |
On the Construction of Random Number Generators and Random Function Generators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings, pp. 225-232, 1988, Springer, 3-540-50251-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #55 of 55 (100 per page; Change: )
|
|