Mathematical Research Data Initiative
Main page
Recent changes
Random page
Help about MediaWiki
Create a new Item
Create a new Property
Create a new EntitySchema
Merge two items
In other projects
Discussion
View source
View history
Purge
English
Log in

Theory of Cryptography

From MaRDI portal
Publication:5898355
Jump to:navigation, search

DOI10.1007/11681878zbMath1112.94009OpenAlexW3149533473WikidataQ57254512 ScholiaQ57254512MaRDI QIDQ5898355

Yevgeniy Dodis, Prashant Puniya

Publication date: 12 February 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11681878



Mathematics Subject Classification ID

Cryptography (94A60)


Related Items (11)

How to build an ideal cipher: the indifferentiability of the Feistel construction ⋮ Towards Understanding the Known-Key Security of Block Ciphers ⋮ Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model ⋮ A short non-delegatable strong designated verifier signature ⋮ On the cryptanalysis of the hash function Fugue: partitioning and inside-out distinguishers ⋮ Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data ⋮ How to Build a Hash Function from Any Collision-Resistant Function ⋮ Verifiable random functions: relations to identity-based key encapsulation and new constructions ⋮ Verifiable Random Functions from Identity-Based Key Encapsulation ⋮ Indifferentiability of 8-Round Feistel Networks ⋮ A Domain Extender for the Ideal Cipher




This page was built for publication: Theory of Cryptography

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:5898355&oldid=16718893"
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information
MaRDI portal item
This page was last edited on 4 February 2024, at 19:27.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki