5 results on '"beyond birthday bound"'
Search Results
2. The Preimage Security of Double-Block-Length Compression Functions
3. Systematic Security Analysis of Stream Encryption With Key Erasure
4. Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation
5. Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.