Clever Arbiters Versus Malicious Adversaries
From MaRDI portal
Publication:2803661
DOI10.1007/978-3-662-49301-4_31zbMath1405.94089OpenAlexW2476117518MaRDI QIDQ2803661
Publication date: 2 May 2016
Published in: The New Codebreakers (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-49301-4_31
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- New types of cryptanalytic attacks using related keys
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- Critique of the related-key attack concept
- On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
- A White-Box DES Implementation for DRM Applications
- On Related-Secret Pseudorandomness
- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
- Composition Implies Adaptive Security in Minicrypt
- Obfuscation for Cryptographic Purposes
- On the (Im)Possibility of Key Dependent Encryption
- A public key cryptosystem and a signature scheme based on discrete logarithms
- New directions in cryptography
- Nonmalleable Cryptography
- Probability Inequalities for Sums of Bounded Random Variables
- Fast Software Encryption
- A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations
This page was built for publication: Clever Arbiters Versus Malicious Adversaries