The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Luby-Rackoff (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1988-1999 (18) 2000-2006 (20) 2007-2021 (16) 2022 (1)
Publication types (Num. hits)
article(13) incollection(2) inproceedings(39) phdthesis(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 24 occurrences of 19 keywords

Results
Found 55 publication records. Showing 55 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
191Rüdiger Weis, Stefan Lucks Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers. Search on Bibsonomy ECMAST The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Luby-Rackoff ciphers, BEAR, LION, BEAST, JAVA, Performance, block cipher
169Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
162Ueli M. Maurer A Simplified and Generalized Treatment of Luby-Rackoff Pseudorandom Permutation Generator. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Locally random function, Luby-Rackoff permutation generator, Pseudorandom function, Pseudorandom permutation
117Yevgeniy Dodis, Prashant Puniya On the Relation Between the Ideal Cipher and the Random Oracle Models. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
111David Goldenberg, Susan Hohenberger, Moses D. Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu On Tweaking Luby-Rackoff Blockciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
111Gilles Piret Luby-Rackoff Revisited: On the Use of Permutations as Inner Functions of a Feistel Scheme. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF AMS Classification 94A60
111Gilles Piret, Jean-Jacques Quisquater Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
111Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram Towards Making Luby-Rackoff Ciphers Optimal and Practical. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
110Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung Threshold and Proactive Pseudo-Random Permutations. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Distributed Block Ciphers, Distributed Luby-Rackoff Construction, Oblivious Pseudo-Random Functions, Threshold Cryptography
88Jacques Patarin About Feistel Schemes with Six (or More) Rounds. Search on Bibsonomy FSE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
88Josef Pieprzyk, Babak Sadeghiyan Optima Perfect Randomizers. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
88Josef Pieprzyk, Reihaneh Safavi-Naini Randomized Authentication Systems. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
81Jacques Patarin, Valérie Nachef, Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unbalanced Feistel permutations, generic attacks, Luby-Rackoff theory, block ciphers, pseudo-random permutations
81Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson ManTiCore: Encryption with Joint Cipher-State Authentication. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher
81Jacques Patarin Generic Attacks on Feistel Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Feistel permutations, generic attacks on encryption schemes, Luby-Rackoff theory, pseudo-random permutations
59Henri Gilbert The Security of "One-Block-to-Many" Modes of Operation. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
59Henri Gilbert, Marine Minier New Results on the Pseudorandomness of Some Blockcipher Constructions. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
59Jacques Patarin New Results on Pseudorandom Permutation Generators Based on the DES Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
52Cuong Nguyen, Anh Nguyen, Long Nguyen, Phong Trieu, Lai Tran Analysis of a New Practical SPN-Based Scheme in the Luby-Rackoff Model. Search on Bibsonomy FDSE (CCIS Volume) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
52Ritam Bhaumik, Mridul Nandi, Anik Raychaudhuri Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
52Srimanta Bhattacharya, Mridul Nandi Luby-Rackoff Backwards with More Users and More Security. Search on Bibsonomy ASIACRYPT (3) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
52Akinori Hosoyamada, Tetsu Iwata Tight Quantum Security Bound of the 4-Round Luby-Rackoff Construction. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
52Akinori Hosoyamada, Tetsu Iwata 4-Round Luby-Rackoff Construction is a qPRP. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
52Kamel Mohamed Faraoun On the semantic security of cellular automata based pseudo-random permutation using results from the Luby-Rackoff construction. Search on Bibsonomy Ann. UMCS Informatica The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
52Lars R. Knudsen Luby-Rackoff Ciphers. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
52 Exponential attacks on 6-round Luby-Rackoff and on 5-round Lai-Massey. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
52Mridul Nandi The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
52David Goldenberg, Susan Hohenberger, Moses D. Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu On Tweaking Luby-Rackoff Blockciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
52Yassin M. Y. Hasan YC: A Luby-Rackoff ciphers family driven by pseudorandom vector/matrix transformations. Search on Bibsonomy ISSPA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
52Ueli Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin Luby-Rackoff Ciphers from Weak Round Functions? Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
52Ueli M. Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin Luby-Rackoff Ciphers from Weak Round Functions? Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52Lars R. Knudsen Luby-Rackoff Ciphers. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Tetsu Iwata, Kaoru Kurosawa On the Universal Hash Functions in Luby-Rackoff Cipher. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2004 DBLP  BibTeX  RDF
52Ueli M. Maurer, Krzysztof Pietrzak The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
52Jacques Patarin Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
52Tetsu Iwata, Kaoru Kurosawa On the Universal Hash Functionsin Luby-Rackoff Cipher. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Block/Stream Ciphers, Provable Security, Cryptographic Primitives
52Zulfikar Ramzan A study of Luby-Rackoff ciphers. Search on Bibsonomy 2001   RDF
52Moni Naor, Omer Reingold On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited. Search on Bibsonomy J. Cryptol. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
52Don Coppersmith Attacking Four-Round Luby-Rackoff Ciphers. Search on Bibsonomy Cryptologia The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
52Mihir Bellare, Ted Krovetz, Phillip Rogaway Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertible. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
52Moni Naor, Omer Reingold On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited Search on Bibsonomy Electron. Colloquium Comput. Complex. The full citation details ... 1997 DBLP  BibTeX  RDF
52Moni Naor, Omer Reingold On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited (Extended Abstract). Search on Bibsonomy STOC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
52Moni Naor, Omer Reingold On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 1996 DBLP  BibTeX  RDF
52Stefan Lucks Faster Luby-Rackoff Ciphers. Search on Bibsonomy FSE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
51Jacques Patarin A Proof of Security in O(2n) for the Xor of Two Random Permutations. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security beyond the birthday bound, Luby-Rackoff backwards, Pseudorandom functions, pseudorandom permutations
51Atsushi Mitsuda, Tetsu Iwata Tweakable Pseudorandom Permutation from Generalized Feistel Structure. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Luby-Rackoff theory, generalized Feistel structure, security proofs, tweakable blockcipher
29Yassin M. Hasan From stream to provably secure block ciphers based on pseudorandom matrix transformations. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Yevgeniy Dodis, Prashant Puniya Feistel Networks Made Public, and Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Verifiable Random Functions/Permutations, PRFs, PRPs, MACs, Domain Extension, Feistel Network
29Serge Vaudenay Decorrelation: A Theory for Block Cipher Security. Search on Bibsonomy J. Cryptol. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block ciphers, Pseudorandomness
29Zulfikar Ramzan, Leonid Reyzin On the Round Security of Symmetric-Key Cryptographic Primitives. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
29John Kelsey, Bruce Schneier Key-Schedule Cryptanalysis of DEAL. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
29Serge Vaudenay Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
29Reihaneh Safavi-Naini Feistel Type Authentication Codes. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
29Claus-Peter Schnorr On the Construction of Random Number Generators and Random Function Generators. Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #55 of 55 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license