Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
25
views
25
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,396
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Information Security and Privacy
How to Re-use Round Function in Super-Pseudorandom Permutation
other
Author(s):
Tetsu Iwata
,
Kaoru Kurosawa
Publication date
(Print):
2004
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Probing cerebral hemodynamics with BOLD fMRI
Most cited references
25
Record
: found
Abstract
: not found
Article
: not found
New hash functions and their use in authentication and set equality
Mark Wegman
,
J.Lawrence Carter
(1981)
0
comments
Cited
268
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
New block encryption algorithm MISTY
Mitsuru Matsui
(1997)
0
comments
Cited
44
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Indistinguishability of Random Systems
Ueli Maurer
(2002)
0
comments
Cited
32
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2004
Pages
: 224-235
DOI:
10.1007/978-3-540-27800-9_20
SO-VID:
7044f3d3-2dba-49ff-b9ef-5483d90212fe
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Multi-service Oriented Broadcast Encryption
pp. 12
Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme
pp. 24
Linear Code Implies Public-Key Traitor Tracing with Revocation
pp. 36
TTS without Revocation Capability Secure Against CCA2
pp. 50
Single Database Private Information Retrieval with Logarithmic Communication
pp. 62
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions
pp. 74
Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing
pp. 86
NGSCB: A Trusted Open System
pp. 98
The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers
pp. 110
Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2
pp. 123
The Related-Key Rectangle Attack – Application to SHACAL-1
pp. 137
Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1
pp. 149
The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders
pp. 157
Analysis of a Conference Scheme Under Active and Passive Attacks
pp. 164
Cryptanalysis of Two Password-Authenticated Key Exchange Protocols
pp. 176
Analysis and Improvement of Micali’s Fair Contract Signing Protocol
pp. 188
Digital Signature Schemes with Domain Parameters
pp. 212
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
pp. 224
How to Re-use Round Function in Super-Pseudorandom Permutation
pp. 236
How to Remove MAC from DHIES
pp. 248
Symmetric Key Authentication Services Revisited
pp. 262
Improvements to the Point Halving Algorithm
pp. 289
A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks
pp. 301
A Mobile Agent System Providing Offer Privacy
pp. 313
Identity-Based Strong Designated Verifier Signature Schemes
pp. 336
A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups
pp. 348
Convertible Nominative Signatures
pp. 358
Protocols with Security Proofs for Mobile Applications
pp. 370
Secure Bilinear Diffie-Hellman Bits
pp. 379
Weak Property of Malleability in NTRUSign
pp. 391
Information Security Risk Assessment, Aggregation, and Mitigation
pp. 402
A Weighted Graph Approach to Authorization Delegation and Conflict Resolution
pp. 414
Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems
pp. 427
Unconditionally Secure Encryption Under Strong Attacks
pp. 440
ManTiCore: Encryption with Joint Cipher-State Authentication
pp. 454
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
pp. 466
On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks
pp. 478
Fault Attacks on Signature Schemes
Similar content
4,396
A comparison of random field theory and permutation methods for the statistical analysis of MEG data.
Authors:
Dimitrios Pantazis
,
Thomas Nichols
,
Richard M. Leahy
…
Artificial bee colony algorithm using permutation encoding for the bounded diameter minimum spanning tree problem
Authors:
Kavita Singh
,
Shyam Sundar
On permutations of order dividing a given integer
Authors:
Alice Niemeyer
,
Cheryl E Praeger
See all similar
Cited by
1
How to Re-use Round Function in Super-Pseudorandom Permutation
Authors:
Tetsu Iwata
,
Kaoru Kurosawa
See all cited by