Information Security and Cryptology - ICISC 2005
From MaRDI portal
Publication:5899293
DOI10.1007/11734727zbMath1185.94059OpenAlexW2493058093MaRDI QIDQ5899293
Kazuhiko Minematsu, Yukiyasu Tsunoo
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11734727
Related Items (2)
Luby-Rackoff Ciphers from Weak Round Functions? ⋮ Tweakable Enciphering Schemes from Hash-Sum-Expansion
This page was built for publication: Information Security and Cryptology - ICISC 2005