Advances in Cryptology – CRYPTO 2004

From MaRDI portal
Publication:5311561

DOI10.1007/b99099zbMath1104.94035OpenAlexW2477011922WikidataQ27980744 ScholiaQ27980744MaRDI QIDQ5311561

Jacques Patarin

Publication date: 23 August 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b99099




Related Items (29)

Linear cryptanalysis of FF3-1 and FEARelated-key analysis of generalized Feistel networks with expanding round functionsThe key-dependent message security of key-alternating Feistel ciphersOptimum attack on 3-round Feistel-2 structureFormat-preserving encryption: a surveyRevisiting key-alternating Feistel ciphers for shorter keys and multi-user securityDerandomized constructions of \(k\)-wise (almost) independent permutationsBeyond-birthday security for permutation-based Feistel networksMirror theory and cryptographyFormat-Preserving Encryption Algorithms Using Families of Tweakable BlockciphersTowards Understanding the Known-Key Security of Block CiphersBeyond-birthday secure domain-preserving PRFs from a single permutationPartition and mix: generalizing the swap-or-not shuffleProof of mirror theory for a wide range of \(\xi_{\max }\)Hardness-preserving reductions via cuckoo hashingA Proof of Security in O(2 n ) for the Benes SchemeBBB security for 5-round even-Mansour-based key-alternating Feistel ciphersOn Lai-Massey and quasi-Feistel ciphers\textsf{TreePIR}: sublinear-time and polylog-bandwidth private information retrieval from DDHGeneric Attacks on Unbalanced Feistel Schemes with Expanding FunctionsDeterministic encryption with the Thorp shuffleGeneric attacks on the Lai-Massey schemeBuilding blockcipher from small-block tweakable blockcipherLuby-Rackoff revisited: on the use of permutations as inner functions of a Feistel schemeLuby-Rackoff Ciphers from Weak Round Functions?A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday BarrierProvable related-key security of contracting Feistel networksBuilding Secure Block Ciphers on Generic Attacks AssumptionsBuilding Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal




This page was built for publication: Advances in Cryptology – CRYPTO 2004