On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses
暂无分享,去创建一个
Hideki Imai | Tsutomu Matsumoto | Yuliang Zheng | H. Imai | Tsutomu Matsumoto | Yuliang Zheng | Tsutomu Matsumoto
[1] J.L. Smith,et al. Some cryptographic techniques for machine-to-machine data communications , 1975, Proceedings of the IEEE.
[2] Rainer A. Rueppel,et al. On the Security of Schnorr's Pseudo Random Generator , 1990, EUROCRYPT.
[3] Ueli Maurer,et al. Perfect Local Randomness in Pseudo-Random Sequences , 1989, CRYPTO.
[4] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[5] Alan G. Konheim. Cryptography, a primer , 1981 .
[6] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[7] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[8] Carl H. Meyer,et al. Ciphertext/plaintext and ciphertext/key dependence vs. number of rounds for the data encryption standard , 1899, AFIPS National Computer Conference.
[9] Leonid A. Levin,et al. One-way functions and pseudorandom generators , 1985, STOC '85.
[10] Hideki Imai,et al. Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract) , 1989, EUROCRYPT.
[11] Claus-Peter Schnorr,et al. On the Construction of Random Number Generators and Random Function Generators , 1988, EUROCRYPT.
[12] Andrew Chi-Chih Yao,et al. Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.
[13] Manuel Blum,et al. How to Generate Cryptographically Strong Sequences of Pseudo Random Bits , 1982, FOCS.
[14] Silvio Micali,et al. How to construct random functions , 1986, JACM.