Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

How to construct pseudorandom permutations from pseudorandom functions

Published: 01 April 1988 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2024)Hierarchical Key Assignment Schemes with Key RotationProceedings of the 29th ACM Symposium on Access Control Models and Technologies10.1145/3649158.3657037(171-182)Online publication date: 24-Jun-2024
  • (2024)E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor NetworksACM Transactions on Sensor Networks10.1145/359261120:4(1-26)Online publication date: 11-May-2024
  • (2024)Ensuring End-to-End Security With Fine-Grained Access Control for Connected and Autonomous VehiclesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.341729219(6962-6977)Online publication date: 1-Jan-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image SIAM Journal on Computing
SIAM Journal on Computing  Volume 17, Issue 2
Special issue on cryptography
April 1988
248 pages

Publisher

Society for Industrial and Applied Mathematics

United States

Publication History

Published: 01 April 1988

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Hierarchical Key Assignment Schemes with Key RotationProceedings of the 29th ACM Symposium on Access Control Models and Technologies10.1145/3649158.3657037(171-182)Online publication date: 24-Jun-2024
  • (2024)E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor NetworksACM Transactions on Sensor Networks10.1145/359261120:4(1-26)Online publication date: 11-May-2024
  • (2024)Ensuring End-to-End Security With Fine-Grained Access Control for Connected and Autonomous VehiclesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.341729219(6962-6977)Online publication date: 1-Jan-2024
  • (2024)A low-time-consumption image encryption combining 2D parametric Pascal matrix chaotic system and elementary operationJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2024.10216936:8Online publication date: 1-Oct-2024
  • (2024)FTPE-BCExpert Systems with Applications: An International Journal10.1016/j.eswa.2024.124574255:PAOnline publication date: 1-Dec-2024
  • (2024)CCA security for contracting (quasi-)Feistel constructions with tight round complexityDesigns, Codes and Cryptography10.1007/s10623-024-01394-x92:8(2103-2129)Online publication date: 1-Aug-2024
  • (2024)On the sequential indifferentiability of the Lai–Massey constructionDesigns, Codes and Cryptography10.1007/s10623-024-01361-692:6(1637-1661)Online publication date: 1-Jun-2024
  • (2024)BBB security for 5-round even-Mansour-based key-alternating Feistel ciphersDesigns, Codes and Cryptography10.1007/s10623-023-01288-492:1(13-49)Online publication date: 1-Jan-2024
  • (2024)Mind the Bad NormsAdvances in Cryptology – ASIACRYPT 202410.1007/978-981-96-0947-5_8(215-247)Online publication date: 10-Dec-2024
  • (2024)Real-Valued Somewhat-Pseudorandom UnitariesTheory of Cryptography10.1007/978-3-031-78017-2_2(36-59)Online publication date: 2-Dec-2024
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media