Populating the zoo of rugged pseudorandom permutations
From MaRDI portal
Publication:6562588
DOI10.1007/978-981-99-8742-9_9zbMATH Open1542.9412MaRDI QIDQ6562588
Jean Paul Degabriele, Vukašin Karadžić
Publication date: 26 June 2024
domain extensionrugged pseudorandom permutationshash-encipher-counterthree-round Feisteltweakable wide-block ciphers
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Tweakable block ciphers
- Short variable length domain extenders with beyond birthday bound security
- Tweakable HCTR: a BBB secure tweakable enciphering scheme
- A Modular Framework for Building Variable-Input-Length Tweakable Ciphers
- How to Securely Release Unverified Plaintext in Authenticated Encryption
- Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal
- A Domain Extender for the Ideal Cipher
- A Provable-Security Treatment of the Key-Wrap Problem
- The “Coefficients H” Technique
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- RIV for Robust Authenticated Encryption
- Tight Security Bounds for Key-Alternating Ciphers
- Progress in Cryptology - INDOCRYPT 2004
- Information Security and Cryptology
- Jammin' on the deck
- Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels
This page was built for publication: Populating the zoo of rugged pseudorandom permutations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6562588)