Abstract. Existing symmetric encryption algorithms target messages consisting of elementary binary blocks of at least 64 bits. Some applica-tions need a block cipher which operates over smaller and possibly non-binary blocks, which can be viewed as a pseudo-random permutation of n elements. We present an algorithm for selecting such a random permu-tation of n elements and evaluating efficiently the permutation and its inverse over arbitrary inputs. We use an underlying deterministic RNG (random number generator). Each evaluation of the permutation uses O(logn) space and O((logn)3) RNG invocations. The selection process is “perfect”: the permutation is uniformly selected among the n! possi-bilities.
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A nov...
Proceeding of: International Conference on Computer Science: ICCS 2002. Amsterdam, The Netherlands, ...
The r-round (iterated) Even-Mansour cipher (also known as key-alternating cipher) defines a block ci...
Abstract. Recent advances in block-cipher theory deliver security analyses in models where one or mo...
The r-rounds Even–Mansour block cipher is a generalization of the well known Even–Mansour block ciph...
ABSTRACT This paper proposes a new system of Substitution-Permutation network along with Randomizat...
This paper proposes a new system of Substitution-Permutation network along with Randomization Expans...
The r-rounds Even-Mansour block cipher uses r public permutations of {0, 1}n and r+1 secret keys. An...
One of the crucial parameters of digital cryptographic systems is the selection of the keys used and...
Abstract. We introduce and study the iterated random permutation problem, which asks how hard it is ...
Abstract: Random sequences play an important role in all aspects of Cryptography. All cryptographic ...
We show how to construct an ideal cipher from a small set of n-bit public random permutations {P1,.....
Random key bit generators are used in statistically secured stream ciphers. In stream ciphers pseudo...
The protection of confidential information is a global issue and block encryption algorithms are the...
Cryptography is essential for secure online communications. Many different types of ciphers are impl...
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A nov...
Proceeding of: International Conference on Computer Science: ICCS 2002. Amsterdam, The Netherlands, ...
The r-round (iterated) Even-Mansour cipher (also known as key-alternating cipher) defines a block ci...
Abstract. Recent advances in block-cipher theory deliver security analyses in models where one or mo...
The r-rounds Even–Mansour block cipher is a generalization of the well known Even–Mansour block ciph...
ABSTRACT This paper proposes a new system of Substitution-Permutation network along with Randomizat...
This paper proposes a new system of Substitution-Permutation network along with Randomization Expans...
The r-rounds Even-Mansour block cipher uses r public permutations of {0, 1}n and r+1 secret keys. An...
One of the crucial parameters of digital cryptographic systems is the selection of the keys used and...
Abstract. We introduce and study the iterated random permutation problem, which asks how hard it is ...
Abstract: Random sequences play an important role in all aspects of Cryptography. All cryptographic ...
We show how to construct an ideal cipher from a small set of n-bit public random permutations {P1,.....
Random key bit generators are used in statistically secured stream ciphers. In stream ciphers pseudo...
The protection of confidential information is a global issue and block encryption algorithms are the...
Cryptography is essential for secure online communications. Many different types of ciphers are impl...
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A nov...
Proceeding of: International Conference on Computer Science: ICCS 2002. Amsterdam, The Netherlands, ...
The r-round (iterated) Even-Mansour cipher (also known as key-alternating cipher) defines a block ci...