Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
26
views
25
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,701
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Information Security and Privacy
How to Re-use Round Function in Super-Pseudorandom Permutation
other
Author(s):
Tetsu Iwata
,
Kaoru Kurosawa
Publication date
(Print):
2004
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Probing cerebral hemodynamics with BOLD fMRI
Most cited references
25
Record
: found
Abstract
: not found
Article
: not found
New hash functions and their use in authentication and set equality
Mark Wegman
,
J.Lawrence Carter
(1981)
0
comments
Cited
268
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
New block encryption algorithm MISTY
Mitsuru Matsui
(1997)
0
comments
Cited
44
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Indistinguishability of Random Systems
Ueli Maurer
(2002)
0
comments
Cited
32
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2004
Pages
: 224-235
DOI:
10.1007/978-3-540-27800-9_20
SO-VID:
7044f3d3-2dba-49ff-b9ef-5483d90212fe
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Multi-service Oriented Broadcast Encryption
pp. 12
Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme
pp. 24
Linear Code Implies Public-Key Traitor Tracing with Revocation
pp. 36
TTS without Revocation Capability Secure Against CCA2
pp. 50
Single Database Private Information Retrieval with Logarithmic Communication
pp. 62
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions
pp. 74
Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing
pp. 86
NGSCB: A Trusted Open System
pp. 98
The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers
pp. 110
Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2
pp. 123
The Related-Key Rectangle Attack – Application to SHACAL-1
pp. 137
Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1
pp. 149
The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders
pp. 157
Analysis of a Conference Scheme Under Active and Passive Attacks
pp. 164
Cryptanalysis of Two Password-Authenticated Key Exchange Protocols
pp. 176
Analysis and Improvement of Micali’s Fair Contract Signing Protocol
pp. 188
Digital Signature Schemes with Domain Parameters
pp. 212
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
pp. 224
How to Re-use Round Function in Super-Pseudorandom Permutation
pp. 236
How to Remove MAC from DHIES
pp. 248
Symmetric Key Authentication Services Revisited
pp. 262
Improvements to the Point Halving Algorithm
pp. 289
A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks
pp. 301
A Mobile Agent System Providing Offer Privacy
pp. 313
Identity-Based Strong Designated Verifier Signature Schemes
pp. 336
A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups
pp. 348
Convertible Nominative Signatures
pp. 358
Protocols with Security Proofs for Mobile Applications
pp. 370
Secure Bilinear Diffie-Hellman Bits
pp. 379
Weak Property of Malleability in NTRUSign
pp. 391
Information Security Risk Assessment, Aggregation, and Mitigation
pp. 402
A Weighted Graph Approach to Authorization Delegation and Conflict Resolution
pp. 414
Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems
pp. 427
Unconditionally Secure Encryption Under Strong Attacks
pp. 440
ManTiCore: Encryption with Joint Cipher-State Authentication
pp. 454
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
pp. 466
On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks
pp. 478
Fault Attacks on Signature Schemes
Similar content
4,701
On some permutation polynomials over F_q of the form x^r*h(x^((q-1)/d)))
Authors:
Michael E. Zieve
Two-sided permutation statistics via symmetric functions
Authors:
Ira M. Gessel
,
Yan Zhuang
Permutation-based simultaneous confidence bounds for the false discovery proportion
Authors:
J Hemerik
,
A Solari
,
J. J. Goeman
See all similar
Cited by
1
How to Re-use Round Function in Super-Pseudorandom Permutation
Authors:
Tetsu Iwata
,
Kaoru Kurosawa
See all cited by