Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 2079924 - MaRDI portal

scientific article; zbMATH DE number 2079924

From MaRDI portal
Publication:4472069

zbMath1045.68561MaRDI QIDQ4472069

Phillip Rogaway, John Black

Publication date: 3 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2271/22710114.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Security analysis of a password-based authentication protocol proposed to IEEE 1363, Linear cryptanalysis of FF3-1 and FEA, How to build an ideal cipher: the indifferentiability of the Feistel construction, Related-key analysis of generalized Feistel networks with expanding round functions, Format-preserving encryption: a survey, eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices, Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption, Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes, EC2C-PAKA: an efficient client-to-client password-authenticated key agreement, Derandomized constructions of \(k\)-wise (almost) independent permutations, CDPS: a cryptographic data publishing system, Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers, Several proofs of security for a tokenization algorithm, Targeted invertible pseudorandom functions and deterministic format-transforming encryption, Randomized half-ideal cipher on groups with applications to UC (a)PAKE, Reverse Cycle Walking and Its Applications, FAST: secure and high performance format-preserving encryption and tokenization, SPF: A New Family of Efficient Format-Preserving Encryption Algorithms, Targeted ciphers for format-preserving encryption, Deterministic encryption with the Thorp shuffle, Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures, An efficient format-preserving encryption mode for practical domains, Three third generation attacks on the format preserving encryption scheme FF3, Provable related-key security of contracting Feistel networks, Private Information Retrieval Using Trusted Hardware, Pseudorandom Functions: Three Decades Later, Modifying an Enciphering Scheme After Deployment