The following pages link to Theory of Cryptography (Q5898355):
Displaying 13 items.
- How to build an ideal cipher: the indifferentiability of the Feistel construction (Q271585) (← links)
- Verifiable random functions: relations to identity-based key encapsulation and new constructions (Q744351) (← links)
- Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model (Q893865) (← links)
- A short non-delegatable strong designated verifier signature (Q893866) (← links)
- On the cryptanalysis of the hash function Fugue: partitioning and inside-out distinguishers (Q1944937) (← links)
- Indifferentiability of 8-Round Feistel Networks (Q2835584) (← links)
- Towards Understanding the Known-Key Security of Block Ciphers (Q2946886) (← links)
- A Domain Extender for the Ideal Cipher (Q3408200) (← links)
- The Random Oracle Model and the Ideal Cipher Model Are Equivalent (Q3600210) (← links)
- Verifiable Random Functions from Identity-Based Key Encapsulation (Q3627457) (← links)
- Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data (Q4605645) (← links)
- How to Build a Hash Function from Any Collision-Resistant Function (Q5387097) (← links)
- Instantiability of classical random-oracle-model encryption transforms (Q6175981) (← links)