Pseudorandom permutation

Results: 30



#Item
21Pseudorandomness / Computability theory / Computational complexity theory / Combinatorics / Cryptography / One-way function / Pseudorandom generator / Oracle machine / Permutation / Mathematics / Theoretical computer science / Applied mathematics

On Hardness Amplification of One-Way Functions Henry Lin? , Luca Trevisan?? , and Hoeteck Wee? ? ? Computer Science Division UC Berkeley

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
22Pseudorandomness / Randomness / Computational complexity theory / Pseudorandom generator theorem / Pseudorandom generator / Random number generation / Random seed / Random permutation / One-way function / Cryptography / Theoretical computer science / Applied mathematics

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:25:01
23Pseudorandom number generator / Function / Permutation / Factorial / Block cipher / Mathematics / Combinatorics / Integer sequences

Perfect Block Ciphers with Small Blocks Louis Granboulan1 and Thomas Pornin2 ´ Ecole Normale Sup´erieure; EADS [removed]

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
24Feistel cipher / Block cipher / Pseudorandom permutation / Oracle machine / Random oracle / Permutation / Oracle Corporation / Slide attack / ICE / Cryptography / Cryptographic hash functions / Advantage

Eliminating Random Permutation Oracles in the Even-Mansour Cipher Craig Gentry and Zulfikar Ramzan

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
25Cryptographic hash functions / Pseudorandomness / Permutations / Pseudorandom permutation / Advantage / Block cipher / Random permutation / Universal hashing / Feistel cipher / Cryptography / Search algorithms / Hashing

A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation M´etodo Gen´erico para Extender el Espacio del Mensaje de una Permutaci´on Pseudo-aleatoria

Add to Reading List

Source URL: www.scielo.org.mx

Language: English - Date: 2010-01-06 17:07:45
26CBC-MAC / CMAC / Block cipher / Feistel cipher / Pseudorandomness / Pseudorandom permutation / Pseudorandom function family / Unpredictable permutation / Index of cryptography articles / Cryptography / Message authentication codes / Advantage

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2005-04-04 15:10:03
27Pseudorandom number generators / Randomness / RC4 / Combinatorics / Random permutation / Advantage / Stream cipher / Pseudorandomness / Markov chain / Cryptography / Mathematics / Permutations

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-06-01 07:12:43
28Pseudorandomness / Feistel cipher / ICE / Block cipher / Pseudorandom function family / Commitment scheme / Advantage / Exclusive or / Optimal asymmetric encryption padding / Cryptography / Permutations / Unpredictable permutation

PDF Document

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2006-11-27 11:45:50
29RC4 / Fluhrer /  Mantin and Shamir attack / Related-key attack / Wired Equivalent Privacy / Initialization vector / Weak key / ICE / Permutation / CipherSaber / Cryptography / Stream ciphers / Pseudorandom number generators

Untitled

Add to Reading List

Source URL: aboba.drizzlehosting.com

Language: English - Date: 2001-08-15 23:17:30
30Avalanche effect / Cryptographic hash function / Random permutation / Cryptanalysis / Pseudorandom permutation / Advantage / Cryptography / Permutations / Block cipher

PDF Document

Add to Reading List

Source URL: 163.117.174.60

Language: English - Date: 2010-04-12 08:03:04
UPDATE