Advances in Cryptology – CRYPTO 2004
From MaRDI portal
Publication:5311561
DOI10.1007/b99099zbMath1104.94035OpenAlexW2477011922WikidataQ27980744 ScholiaQ27980744MaRDI QIDQ5311561
Publication date: 23 August 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b99099
Related Items (29)
Linear cryptanalysis of FF3-1 and FEA ⋮ Related-key analysis of generalized Feistel networks with expanding round functions ⋮ The key-dependent message security of key-alternating Feistel ciphers ⋮ Optimum attack on 3-round Feistel-2 structure ⋮ Format-preserving encryption: a survey ⋮ Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security ⋮ Derandomized constructions of \(k\)-wise (almost) independent permutations ⋮ Beyond-birthday security for permutation-based Feistel networks ⋮ Mirror theory and cryptography ⋮ Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers ⋮ Towards Understanding the Known-Key Security of Block Ciphers ⋮ Beyond-birthday secure domain-preserving PRFs from a single permutation ⋮ Partition and mix: generalizing the swap-or-not shuffle ⋮ Proof of mirror theory for a wide range of \(\xi_{\max }\) ⋮ Hardness-preserving reductions via cuckoo hashing ⋮ A Proof of Security in O(2 n ) for the Benes Scheme ⋮ BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers ⋮ On Lai-Massey and quasi-Feistel ciphers ⋮ \textsf{TreePIR}: sublinear-time and polylog-bandwidth private information retrieval from DDH ⋮ Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions ⋮ Deterministic encryption with the Thorp shuffle ⋮ Generic attacks on the Lai-Massey scheme ⋮ Building blockcipher from small-block tweakable blockcipher ⋮ Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme ⋮ Luby-Rackoff Ciphers from Weak Round Functions? ⋮ A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier ⋮ Provable related-key security of contracting Feistel networks ⋮ Building Secure Block Ciphers on Generic Attacks Assumptions ⋮ Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal
This page was built for publication: Advances in Cryptology – CRYPTO 2004