Mirror theory and cryptography
From MaRDI portal
Publication:1675488
DOI10.1007/S00200-017-0326-YzbMath1375.94154OpenAlexW2615109279MaRDI QIDQ1675488
Publication date: 27 October 2017
Published in: Applicable Algebra in Engineering, Communication and Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00200-017-0326-y
generic cryptographic systemsnumber of solutions of linear systems of equalities and inequalitiessecurity proofs in cryptography
Related Items (6)
Tight security of cascaded LRW2 ⋮ A modular approach to the security analysis of two-permutation constructions ⋮ Improved multi-user security using the squared-ratio method ⋮ Categorization of faulty nonce misuse resistant message authentication ⋮ Provably secure reflection ciphers ⋮ How to build optimally secure PRFs using block ciphers
Cites Work
This page was built for publication: Mirror theory and cryptography