Abstract Luby and Rackoff [27] showed a method for constructing a pseudo-random permutation from a pseudo-random function. The method is based on composing four (or three for weakened security) so called Feistel permutations, each of which requires the evaluation of a pseudo-random function. We reduce somewhat the complexity of the construction and simplify its proof of security by showing that two Feistel permutations are sufficient together with initial and final pair-wise independent permutations. The revised construction and proof provide a framework in which similar constructions may be brought up and their security can be easily proved. We demonstrate this by presenting some additional adjustments of the construction that achieve the ...
Abstract. We construct a reasonably efficient threshold and proactive pseudo-random permutation (PRP...
We construct a reasonably efficient threshold and proactive pseudo-random permutation (PRP). Our pro...
This paper proposes a semantically secure construction of pseudo-random permutations using second-or...
Luby and Rackoff [27] showed a method for constructing a pseudo-random permutation from a pseudo-ran...
Luby and Rackoff [27] showed a method for constructing a pseudo-random permutation from a pseudo-ran...
Pseudorandom Functions (PRFs), introduced by Goldreich, Goldwasser and Micali [9], allow one to e#c...
This paper is a continuation of the work initiated in [2] by M. Luby and C. Rackoff on Feistel schem...
AbstractFour round Feistel permutation (like DES) is super-pseudorandom if each round function is ra...
AbstractA pseudo-random function is a fundamental cryptographic primitive that is essential for encr...
This paper provides the first provably secure construction of an invertible random permutation (and ...
Abstract We show how to construct pseudo-random permutations that satisfy a certain cycle restrictio...
grantor: University of TorontoWe attempt to provide evidence for the security of block-cip...
Abstract. We describe efficient constructions for various cryptographic primitives in private-key as...
In this paper we will extend the Benes and Luby-Racko# constructions to design various pseudo-rando...
We describe efficient constructions for various cryptographic primitives (both in privatekey and in ...
Abstract. We construct a reasonably efficient threshold and proactive pseudo-random permutation (PRP...
We construct a reasonably efficient threshold and proactive pseudo-random permutation (PRP). Our pro...
This paper proposes a semantically secure construction of pseudo-random permutations using second-or...
Luby and Rackoff [27] showed a method for constructing a pseudo-random permutation from a pseudo-ran...
Luby and Rackoff [27] showed a method for constructing a pseudo-random permutation from a pseudo-ran...
Pseudorandom Functions (PRFs), introduced by Goldreich, Goldwasser and Micali [9], allow one to e#c...
This paper is a continuation of the work initiated in [2] by M. Luby and C. Rackoff on Feistel schem...
AbstractFour round Feistel permutation (like DES) is super-pseudorandom if each round function is ra...
AbstractA pseudo-random function is a fundamental cryptographic primitive that is essential for encr...
This paper provides the first provably secure construction of an invertible random permutation (and ...
Abstract We show how to construct pseudo-random permutations that satisfy a certain cycle restrictio...
grantor: University of TorontoWe attempt to provide evidence for the security of block-cip...
Abstract. We describe efficient constructions for various cryptographic primitives in private-key as...
In this paper we will extend the Benes and Luby-Racko# constructions to design various pseudo-rando...
We describe efficient constructions for various cryptographic primitives (both in privatekey and in ...
Abstract. We construct a reasonably efficient threshold and proactive pseudo-random permutation (PRP...
We construct a reasonably efficient threshold and proactive pseudo-random permutation (PRP). Our pro...
This paper proposes a semantically secure construction of pseudo-random permutations using second-or...