Notions and relations for RKA-secure permutation and function families
From MaRDI portal
Publication:540472
DOI10.1007/s10623-010-9414-8zbMath1215.94058OpenAlexW2001147757MaRDI QIDQ540472
Ermaliza Razali, Marc Joye, Raphael C.-W. Phan, Jaechul Sung, Jongsung Kim
Publication date: 3 June 2011
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://dspace.lboro.ac.uk/2134/8189
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Differential cryptanalysis of DES-like cryptosystems
- On the construction of pseudorandom permutations: Luby-Rackoff revisited
- Key-dependent S-boxes and differential cryptanalysis
- Decorrelation: a theory for block cipher security
- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- CHOSEN-KEY ATTACKS ON A BLOCK CIPHER
- Information Security and Privacy
- Related-Key Boomerang and Rectangle Attacks
- A Simple Related-Key Attack on the Full SHACAL-1
- Advances in Cryptology - CRYPTO 2003
- A Related-Key Rectangle Attack on the Full KASUMI
- New Cryptanalytic Results on IDEA
- Information Security
- Progress in Cryptology - INDOCRYPT 2004
- Progress in Cryptology - INDOCRYPT 2004
- Fast Software Encryption
- Fast Software Encryption
- Fast Software Encryption
- Selected Areas in Cryptography
- Topics in Cryptology – CT-RSA 2004
- Topics in Cryptology – CT-RSA 2004
- Fast Software Encryption
- How to protect DES against exhaustive key search (an analysis of DESX).
- The security of the cipher block chaining message authentication code
This page was built for publication: Notions and relations for RKA-secure permutation and function families