scientific article; zbMATH DE number 2079924
From MaRDI portal
Publication:4472069
zbMath1045.68561MaRDI QIDQ4472069
Publication date: 3 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2271/22710114.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Security analysis of a password-based authentication protocol proposed to IEEE 1363, Linear cryptanalysis of FF3-1 and FEA, How to build an ideal cipher: the indifferentiability of the Feistel construction, Related-key analysis of generalized Feistel networks with expanding round functions, Format-preserving encryption: a survey, eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices, Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption, Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes, EC2C-PAKA: an efficient client-to-client password-authenticated key agreement, Derandomized constructions of \(k\)-wise (almost) independent permutations, CDPS: a cryptographic data publishing system, Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers, Several proofs of security for a tokenization algorithm, Targeted invertible pseudorandom functions and deterministic format-transforming encryption, Randomized half-ideal cipher on groups with applications to UC (a)PAKE, Reverse Cycle Walking and Its Applications, FAST: secure and high performance format-preserving encryption and tokenization, SPF: A New Family of Efficient Format-Preserving Encryption Algorithms, Targeted ciphers for format-preserving encryption, Deterministic encryption with the Thorp shuffle, Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures, An efficient format-preserving encryption mode for practical domains, Three third generation attacks on the format preserving encryption scheme FF3, Provable related-key security of contracting Feistel networks, Private Information Retrieval Using Trusted Hardware, Pseudorandom Functions: Three Decades Later, Modifying an Enciphering Scheme After Deployment