Author:
Iwata Tetsu,Yoshino Tomonobu,Kurosawa Kaoru
Publisher
Springer Berlin Heidelberg
Reference11 articles.
1. J. L. Carter and M. N. Wegman. Universal classes of hash functions. JCSS, vol. 18, no. 2, pp. 143–154, 1979.
2. Lect Notes Comput Sci;H. Gilbert,2002
3. Lect Notes Comput Sci;T. Iwata,2002
4. M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput., vol. 17, no. 2, pp. 373–386, April 1988.
5. Lect Notes Comput Sci;S. Lucks,1996
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security of the Misty Structure beyond the Birthday Bound;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2014
2. Security of the Misty Structure Using Involutions as Round Functions;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2010
3. How to Re-use Round Function in Super-Pseudorandom Permutation;Information Security and Privacy;2004
4. Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results;Selected Areas in Cryptography;2004