Search

Your search keyword '"beyond birthday bound"' showing total 18 results

Search Constraints

Start Over You searched for: Descriptor "beyond birthday bound" Remove constraint Descriptor: "beyond birthday bound"
18 results on '"beyond birthday bound"'

Search Results

1. Tight Security Bound of

2. Permutation-Based Hashing Beyond the Birthday Bound

4. Systematic Security Analysis of Stream Encryption With Key Erasure.

5. Short Variable Length Domain Extenders with Beyond Birthday Bound Security

6. Constructions of Beyond-Birthday Secure PRFs from Random Permutations, Revisited

7. Turning Online Ciphers Off

8. Optimally Secure Tweakable Blockciphers

9. On the XOR of Multiple Random Permutations

10. Beyond-birthday secure domain-preserving PRFs from a single permutation.

11. Tweakable Blockciphers with Asymptotically Optimal Security

12. The Preimage Security of Double-Block-Length Compression Functions

13. Optimal collision security in double block length hashing with single length key.

14. Systematic Security Analysis of Stream Encryption With Key Erasure

15. Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation

16. Constructions of Beyond-Birthday Secure PRFs from Random Permutations, Revisited.

17. Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation.

18. Tweakable Blockciphers with Asymptotically Optimal Security

Catalog

Books, media, physical & digital resources