Author:
Abdalla Michel,Benhamouda Fabrice,Passelègue Alain,Paterson Kenneth G.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference24 articles.
1. M. Abdalla, F. Benhamouda, A. Passelègue, K.G. Paterson, Related-key security for pseudorandom functions beyond the linear barrier, in J.A. Garay, R. Gennaro, editors, CRYPTO 2014, Part I. LNCS, vol. 8616 (Springer, Heidelberg, 2014), pp. 77–94
2. M. Bellare, D. Cash, Pseudorandom functions and permutations provably secure against related-key attacks, in T. Rabin, editor, CRYPTO 2010. LNCS, vol. 6223 (Springer, Heidelberg, 2010), pp. 666–684
3. M. Bellare, D. Cash, Pseudorandom functions and permutations provably secure against related-key attacks. Cryptology ePrint Archive, Report 2010/397 (2010).
http://eprint.iacr.org/
. Last updated 27/10/2013
4. M. Bellare, D. Cash, R. Miller. Cryptography secure against related-key attacks and tampering, in D.H. Lee, X. Wang, editors, ASIACRYPT 2011. LNCS, vol. 7073 (Springer, Heidelberg, 2011), pp. 486–503
5. E. Biham, O. Dunkelman, N. Keller, Related-key boomerang and rectangle attacks, in R. Cramer, editor, EUROCRYPT 2005. LNCS, vol. 3494 (Springer, Heidelberg, 2005), pp. 507–525
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献