Alamati, Navid; Montgomery, Hart; Patranabis, Sikhar; Roy, Arnab Minicrypt primitives with algebraic structure and applications. (English) Zbl 07638790 J. Cryptology 36, No. 1, Paper No. 2, 106 p. (2023). Reviewer: Janaka Alawatugoda (Peradeniya) MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{N. Alamati} et al., J. Cryptology 36, No. 1, Paper No. 2, 106 p. (2023; Zbl 07638790) Full Text: DOI OpenURL
Dinur, Itai; Goldfeder, Steven; Halevi, Tzipora; Ishai, Yuval; Kelkar, Mahimna; Sharma, Vivek; Zaverucha, Greg MPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applications. (English) Zbl 1489.94095 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 12828, 517-547 (2021). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{I. Dinur} et al., Lect. Notes Comput. Sci. 12828, 517--547 (2021; Zbl 1489.94095) Full Text: DOI OpenURL
Yang, Rupeng; Au, Man Ho; Yu, Zuoxia; Xu, Qiuliang Collusion resistant watermarkable PRFs from standard assumptions. (English) Zbl 07614552 Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12170, 590-620 (2020). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{R. Yang} et al., Lect. Notes Comput. Sci. 12170, 590--620 (2020; Zbl 07614552) Full Text: DOI OpenURL
Badrinarayanan, Saikrishna; Rex, Fernando; Jain, Aayush; Khurana, Dakshita; Sahai, Amit Statistical ZAP arguments. (English) Zbl 1479.94120 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12107, 642-667 (2020). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Badrinarayanan} et al., Lect. Notes Comput. Sci. 12107, 642--667 (2020; Zbl 1479.94120) Full Text: DOI OpenURL
Simon, Thierry; Batina, Lejla; Daemen, Joan; Grosso, Vincent; Massolino, Pedro Maat Costa; Papagiannopoulos, Kostas; Regazzoni, Francesco; Samwel, Niels Friet: an authenticated encryption scheme with built-in fault detection. (English) Zbl 1479.94343 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12105, 581-611 (2020). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{T. Simon} et al., Lect. Notes Comput. Sci. 12105, 581--611 (2020; Zbl 1479.94343) Full Text: DOI OpenURL
Brier, Éric; Ferradi, Houda; Joye, Marc; Naccache, David New number-theoretic cryptographic primitives. (English) Zbl 1465.94059 J. Math. Cryptol. 14, 224-235 (2020). Reviewer: Jaak Henno (Tallinn) MSC: 94A60 11T71 11A15 11R18 PDF BibTeX XML Cite \textit{É. Brier} et al., J. Math. Cryptol. 14, 224--235 (2020; Zbl 1465.94059) Full Text: DOI OpenURL
Amy, Matthew; Di Matteo, Olivia; Gheorghiu, Vlad; Mosca, Michele; Parent, Alex; Schanck, John Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3. (English) Zbl 1418.94028 Avanzi, Roberto (ed.) et al., Selected areas in cryptography – SAC 2016. 23rd international conference, St. John’s, NL, Canada, August 10–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10532, 317-337 (2017). MSC: 94A60 81P94 PDF BibTeX XML Cite \textit{M. Amy} et al., Lect. Notes Comput. Sci. 10532, 317--337 (2017; Zbl 1418.94028) Full Text: DOI arXiv OpenURL
Chailloux, André; Kerenidis, Iordanis Physical limitations of quantum cryptographic primitives or optimal bounds for quantum coin flipping and bit commitment. (English) Zbl 1383.81067 SIAM J. Comput. 46, No. 5, 1647-1677 (2017). MSC: 81P94 68Q12 81P68 94A60 PDF BibTeX XML Cite \textit{A. Chailloux} and \textit{I. Kerenidis}, SIAM J. Comput. 46, No. 5, 1647--1677 (2017; Zbl 1383.81067) Full Text: DOI OpenURL
Markovski, Smile Design of crypto primitives based on quasigroups. (English) Zbl 1397.94088 Quasigroups Relat. Syst. 23, No. 1, 41-90 (2015). MSC: 94A60 20N05 68P25 PDF BibTeX XML Cite \textit{S. Markovski}, Quasigroups Relat. Syst. 23, No. 1, 41--90 (2015; Zbl 1397.94088) OpenURL
Mella, Silvia; Susella, Ruggero On the homomorphic computation of symmetric cryptographic primitives. (English) Zbl 1317.94124 Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 28-44 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Mella} and \textit{R. Susella}, Lect. Notes Comput. Sci. 8308, 28--44 (2013; Zbl 1317.94124) Full Text: DOI OpenURL
Hirsch, E. A.; Melanich, O.; Nikolenko, S. I. Feebly secure cryptographic primitives. (English. Russian original) Zbl 1262.94023 J. Math. Sci., New York 188, No. 1, 17-34 (2013); translation from Zap. Nauchn. Semin. POMI 399, 32-64 (2012). MSC: 94A60 94C10 PDF BibTeX XML Cite \textit{E. A. Hirsch} et al., J. Math. Sci., New York 188, No. 1, 17--34 (2013; Zbl 1262.94023); translation from Zap. Nauchn. Semin. POMI 399, 32--64 (2012) Full Text: DOI OpenURL
Mileva, Aleksandra; Markovski, Smile Shapeless quasigroups derived by Feistel orthomorphisms. (English) Zbl 1269.94027 Glas. Mat., III. Ser. 47, No. 2, 333-349 (2012). Reviewer: Jerzy Żurawiecki (Lublin) MSC: 94A60 20N05 94A55 PDF BibTeX XML Cite \textit{A. Mileva} and \textit{S. Markovski}, Glas. Mat., III. Ser. 47, No. 2, 333--349 (2012; Zbl 1269.94027) Full Text: DOI OpenURL
Alekhnovich, Michael More on average case vs approximation complexity. (English) Zbl 1242.68109 Comput. Complexity 20, No. 4, 755-786 (2011). MSC: 68Q17 68Q30 68W25 03F20 68Q10 94A60 PDF BibTeX XML Cite \textit{M. Alekhnovich}, Comput. Complexity 20, No. 4, 755--786 (2011; Zbl 1242.68109) Full Text: DOI OpenURL
Martinho, Joana; Ravara, António Encoding cryptographic primitives in a calculus with polyadic synchronisation. (English) Zbl 1216.68194 J. Autom. Reasoning 46, No. 3-4, 293-323 (2011). MSC: 68Q85 94A60 PDF BibTeX XML Cite \textit{J. Martinho} and \textit{A. Ravara}, J. Autom. Reasoning 46, No. 3--4, 293--323 (2011; Zbl 1216.68194) Full Text: DOI OpenURL
Mileva, Aleksandra; Markovski, Smile On the prop ratio tables of extended Feistel networks and their quasigroups. (English) Zbl 1342.20064 Math. Maced. 8, 53-59 (2010). MSC: 20N05 94A60 PDF BibTeX XML Cite \textit{A. Mileva} and \textit{S. Markovski}, Math. Maced. 8, 53--59 (2010; Zbl 1342.20064) Full Text: Link OpenURL
Grigoriev, D.; Kojevnikov, A.; Nikolenko, S. J. Algebraic cryptography: new constructions and their security against provable break. (English. Russian original) Zbl 1206.94069 St. Petersbg. Math. J. 20, No. 6, 937-953 (2009); translation from Algebra Anal. 20, No. 6, 119-147 (2008). MSC: 94A60 16Z05 68P25 11T71 PDF BibTeX XML Cite \textit{D. Grigoriev} et al., St. Petersbg. Math. J. 20, No. 6, 937--953 (2009; Zbl 1206.94069); translation from Algebra Anal. 20, No. 6, 119--147 (2008) Full Text: DOI OpenURL
Fang, Yan-ping; Zhang, Xiao-fang; Zhang, Guang-quan Improvement of authentication test based on strand spaces model. (Chinese. English summary) Zbl 1171.68354 J. Comput. Appl. 28, No. 12, 3205-3207 (2008). MSC: 68M12 68M10 PDF BibTeX XML Cite \textit{Y.-p. Fang} et al., J. Comput. Appl. 28, No. 12, 3205--3207 (2008; Zbl 1171.68354) Full Text: DOI OpenURL
Ytrehus, Øyvind Communication on inductively coupled channels: overview and challenges. (English) Zbl 1166.94300 Barbero, Ángela (ed.), Coding theory and applications. Second international castle meeting, ICMCTA 2008, Castillo de La Mota, Medina del Campo, Spain, September 15–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-87447-8/pbk). Lecture Notes in Computer Science 5228, 186-195 (2008). MSC: 94A05 94A60 PDF BibTeX XML Cite \textit{Ø. Ytrehus}, Lect. Notes Comput. Sci. 5228, 186--195 (2008; Zbl 1166.94300) Full Text: DOI OpenURL
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal Computationally private randomizing polynomials and their applications. (English) Zbl 1143.94009 Comput. Complexity 15, No. 2, 115-162 (2006). Reviewer: Jozef Vyskoč (Bratislava) MSC: 94A60 68Q15 PDF BibTeX XML Cite \textit{B. Applebaum} et al., Comput. Complexity 15, No. 2, 115--162 (2006; Zbl 1143.94009) Full Text: DOI OpenURL
Armknecht, Frederik; Krause, Matthias Constructing single- and multi-output Boolean functions with maximal algebraic immunity. (English) Zbl 1133.94308 Bugliesi, Michele (ed.) et al., Automata, languages and programming. 33rd international colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-35907-4/pbk). Lecture Notes in Computer Science 4052, 180-191 (2006). MSC: 94A60 06E30 PDF BibTeX XML Cite \textit{F. Armknecht} and \textit{M. Krause}, Lect. Notes Comput. Sci. 4052, 180--191 (2006; Zbl 1133.94308) Full Text: DOI OpenURL
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal Cryptography in NC\(^0\). (English) Zbl 1126.94014 SIAM J. Comput. 36, No. 4, 845-888 (2006). Reviewer: Vladimír Lacko (Košice) MSC: 94A60 68P25 68Q15 PDF BibTeX XML Cite \textit{B. Applebaum} et al., SIAM J. Comput. 36, No. 4, 845--888 (2006; Zbl 1126.94014) Full Text: DOI OpenURL
Meier, Remo; Przydatek, Bartosz On robust combiners for private information retrieval and other primitives. (English) Zbl 1129.94030 Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 555-569 (2006). MSC: 94A60 68P20 PDF BibTeX XML Cite \textit{R. Meier} and \textit{B. Przydatek}, Lect. Notes Comput. Sci. 4117, 555--569 (2006; Zbl 1129.94030) Full Text: DOI OpenURL
Fibíková, Lenka Random oracle model and analysis of primitives of a cryptographic scheme. (English) Zbl 1174.94356 Tatra Mt. Math. Publ. 33, 15-29 (2006). Reviewer: Karol Nemoga (Bratislava) MSC: 94A60 PDF BibTeX XML Cite \textit{L. Fibíková}, Tatra Mt. Math. Publ. 33, 15--29 (2006; Zbl 1174.94356) OpenURL
Chang, Yan-Cheng; Hsiao, Chun-Yuan; Lu, Chi-Jen The impossibility of basing one-way permutations on central cryptographic primitives. (English) Zbl 1096.94024 J. Cryptology 19, No. 1, 97-114 (2006). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{Y.-C. Chang} et al., J. Cryptology 19, No. 1, 97--114 (2006; Zbl 1096.94024) Full Text: DOI OpenURL
Courtois, Nicolas T. General principles of algebraic attacks and new design criteria for cipher components. (English) Zbl 1117.94315 Dobbertin, Hans (ed.) et al., Advanced encryption standard – AES. 4th international conference, AES 2004, Bonn, Germany, May 10–12, 2004. Revised selected and invited papers. Berlin: Springer (ISBN 3-540-26557-0/pbk). Lecture Notes in Computer Science 3373, 67-83 (2005). MSC: 94A60 PDF BibTeX XML Cite \textit{N. T. Courtois}, Lect. Notes Comput. Sci. 3373, 67--83 (2005; Zbl 1117.94315) Full Text: DOI OpenURL
Aaronson, Scott; Shi, Yaoyun Quantum lower bounds for the collision and the element distinctness problems. (English) Zbl 1169.68406 J. ACM 51, No. 4, 595-605 (2004). MSC: 68Q05 68Q17 68Q25 81P68 PDF BibTeX XML Cite \textit{S. Aaronson} and \textit{Y. Shi}, J. ACM 51, No. 4, 595--605 (2004; Zbl 1169.68406) Full Text: DOI Link OpenURL
Chow, Sherman S. M.; Yiu, S. M.; Hui, Lucas C. K.; Chow, K. P. Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. (English) Zbl 1092.94505 Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 352-369 (2004). MSC: 94A60 PDF BibTeX XML Cite \textit{S. S. M. Chow} et al., Lect. Notes Comput. Sci. 2971, 352--369 (2004; Zbl 1092.94505) Full Text: DOI OpenURL
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong; Wild, Peter R. Threshold MACs. (English) Zbl 1031.94522 Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 237-252 (2003). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{K. M. Martin} et al., Lect. Notes Comput. Sci. 2587, 237--252 (2003; Zbl 1031.94522) Full Text: Link OpenURL
Iwata, Tetsu; Kurosawa, Kaoru On the universal hash functions in Luby-Rackoff cipher. (English) Zbl 1031.94518 Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 226-236 (2003). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{T. Iwata} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 2587, 226--236 (2003; Zbl 1031.94518) Full Text: Link OpenURL
Zenner, Erik On the efficiency of the clock control guessing attack. (English) Zbl 1031.94531 Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 200-212 (2003). MSC: 94A60 94A55 PDF BibTeX XML Cite \textit{E. Zenner}, Lect. Notes Comput. Sci. 2587, 200--212 (2003; Zbl 1031.94531) Full Text: Link OpenURL
Cubaleska, Biljana; Qiu, Weidong; Schneider, Markus How to play Sherlock Holmes in the world of mobile agents. (English) Zbl 1024.94516 Batten, Lynn (ed.) et al., Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2384, 449-463 (2002). MSC: 94A62 68U35 PDF BibTeX XML Cite \textit{B. Cubaleska} et al., Lect. Notes Comput. Sci. 2384, 449--463 (2002; Zbl 1024.94516) Full Text: Link OpenURL
Chang, Yan-Cheng; Hsiao, Chun-Yun; Lu, Chi-Jen On the impossibilities of basing one-way permutations on central cryptographic primitives. (English) Zbl 1065.94542 Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 110-124 (2002). MSC: 94A60 65C10 68P25 PDF BibTeX XML Cite \textit{Y.-C. Chang} et al., Lect. Notes Comput. Sci. 2501, 110--124 (2002; Zbl 1065.94542) Full Text: DOI OpenURL
Joux, Antoine; Martinet, Gwenaëlle; Valette, Frédéric Blockwise-adaptive attackers. Revisiting the (in)security of some provably secure encryption modes: CBC, GEM, IACBC. (English) Zbl 1026.94531 Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 17-30 (2002). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{A. Joux} et al., Lect. Notes Comput. Sci. 2442, 17--30 (2002; Zbl 1026.94531) Full Text: Link OpenURL
Fitzi, Matthias; Garay, Juan A.; Maurer, Ueli; Ostrovsky, Rafail Minimal complete primitives for secure multi-party computation. (English) Zbl 1015.94541 Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 80-100 (2001). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Fitzi} et al., Lect. Notes Comput. Sci. 2139, 80--100 (2001; Zbl 1015.94541) OpenURL
Hernández, Julio César; Sierra, José María; Ribagorda, Arturo; Ramos, Benjamin; Mex-Perera, J. C. Distinguishing TEA from a random permutation: reduced round versions of TEA do not have the SAC or do not generate random numbers. (English) Zbl 1002.68810 Honary, Bahram (ed.), Cryptography and coding. 8th IMA international conference, Cirencester, GB, December 17-19, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2260, 374-377 (2001). MSC: 94A60 PDF BibTeX XML Cite \textit{J. C. Hernández} et al., Lect. Notes Comput. Sci. 2260, 374--377 (2001; Zbl 1002.68810) Full Text: DOI OpenURL
Korjik, Valeri; Morozov, Kirill Generalized oblivious transfer protocols based on noisy channels. (English) Zbl 0995.94543 Gorodetski, V. I. (ed.) et al., Information assurance in computer networks. Methods, models and architectures for network security. International workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2052, 219-229 (2001). MSC: 94A60 PDF BibTeX XML Cite \textit{V. Korjik} and \textit{K. Morozov}, Lect. Notes Comput. Sci. 2052, 219--229 (2001; Zbl 0995.94543) Full Text: Link OpenURL
Buchmann, Johannes; Hamdy, Safuat A survey on IQ cryptography. (English) Zbl 0983.94034 Alster, Kazimierz (ed.) et al., Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000. Berlin: de Gruyter. 1-15 (2001). MSC: 94A60 11R04 11R29 PDF BibTeX XML Cite \textit{J. Buchmann} and \textit{S. Hamdy}, in: Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11--15, 2000. Berlin: de Gruyter. 1--15 (2001; Zbl 0983.94034) OpenURL
Handschuh, Helena; Knudsen, Lars R.; Robshaw, Matthew J. Analysis of SHA-1 in encryption mode. (English) Zbl 0995.94541 Naccache, David (ed.), Topics in cryptology - CT-RSA 2001. The cryptographer’s track at RSA conference 2001, San Francisco, CA, USA, April 8-12, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2020, 70-83 (2001). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{H. Handschuh} et al., Lect. Notes Comput. Sci. 2020, 70--83 (2001; Zbl 0995.94541) OpenURL
Brincat, Karl On the use of RSA as a secret key cryptosystem. (English) Zbl 0990.94023 Des. Codes Cryptography 22, No. 3, 317-329 (2001). Reviewer: Jozef Vyskoč (Bratislava) MSC: 94A60 PDF BibTeX XML Cite \textit{K. Brincat}, Des. Codes Cryptography 22, No. 3, 317--329 (2001; Zbl 0990.94023) Full Text: DOI OpenURL
Goldmann, Mikael; Russell, Alexander Spectral bounds on general hard core predicates. (Extended abstract). (English) Zbl 0991.94036 Reichel, Horst (ed.) et al., STACS 2000. 17th annual symposium on Theoretical aspects of computer science. Lille, France, February 17-19, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1770, 614-625 (2000). MSC: 94A60 06E30 94C10 PDF BibTeX XML Cite \textit{M. Goldmann} and \textit{A. Russell}, Lect. Notes Comput. Sci. 1770, 614--625 (2000; Zbl 0991.94036) OpenURL
Abadi, Martín; Fournet, Cédric; Gonthier, Georges A top-down look at a secure message. (English) Zbl 0983.94511 Pandu Rangan, C. (ed.) et al., Foundations of software technology and theoretical computer science. 19th conference, Chennai, India, December 13-15, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1738, 122-141 (1999). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{M. Abadi} et al., Lect. Notes Comput. Sci. 1738, 122--141 (1999; Zbl 0983.94511) OpenURL
Preneel, Bart; Rijmen, Vincent; Bosselaers, Antoon Recent developments in the design of conventional cryptographic algorithms. (English) Zbl 0955.94016 Preneel, Bart (ed.) et al., State of the art in applied cryptography. Course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997. Revised lectures. Berlin: Springer. Lect. Notes Comput. Sci. 1528, 105-130 (1998). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{B. Preneel} et al., Lect. Notes Comput. Sci. 1528, 105--130 (1998; Zbl 0955.94016) OpenURL
Preneel, Bart Cryptographic primitives for information authentication – State of the art. (English) Zbl 0954.94018 Preneel, Bart (ed.) et al., State of the art in applied cryptography. Course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997. Revised lectures. Berlin: Springer. Lect. Notes Comput. Sci. 1528, 49-104 (1998). MSC: 94A62 94-02 94A60 PDF BibTeX XML Cite \textit{B. Preneel}, Lect. Notes Comput. Sci. 1528, 49--104 (1998; Zbl 0954.94018) OpenURL
Filiol, Eric; Fontaine, Caroline Highly nonlinear balanced Boolean functions with a good correlation-immunity. (English) Zbl 0919.94014 Nyberg, Kaisa (ed.), Advances in Cryptology. International conference on the Theory and application of cryptographic techniques. Espoo, Finland, May 31 - June 4, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1403, 475-488 (1998). MSC: 94A60 06E30 PDF BibTeX XML Cite \textit{E. Filiol} and \textit{C. Fontaine}, Lect. Notes Comput. Sci. 1403, 475--488 (1998; Zbl 0919.94014) OpenURL
Schnorr, Claus Peter; Vaudenay, Serge The black-box model for cryptographic primitives. (English) Zbl 0923.94024 J. Cryptology 11, No. 2, 125-140 (1998). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 PDF BibTeX XML Cite \textit{C. P. Schnorr} and \textit{S. Vaudenay}, J. Cryptology 11, No. 2, 125--140 (1998; Zbl 0923.94024) Full Text: DOI OpenURL
Beaver, Donald Correlated pseudorandomness and the complexity of private computations. (English) Zbl 0917.94012 Proceedings of the 28th annual ACM symposium on the theory of computing (STOC). Philadelphia, PA, USA, May 22–24, 1996. New York, NY: ACM, 479-488 (1996). MSC: 94A60 68Q25 68P25 PDF BibTeX XML Cite \textit{D. Beaver}, in: Proceedings of the 28th annual ACM symposium on the theory of computing, STOC '96. Philadelphia, PA, USA, May 22--24, 1996. New York, NY: ACM. 479--488 (1996; Zbl 0917.94012) OpenURL
Vaudenay, Serge On the need for multipermutations: cryptanalysis of MD4 and SAFER. (English) Zbl 0939.94542 Preneel, Bart (ed.), Fast software encryption. 2nd international workshop, Leuven, Belgium, December 14-16, 1994. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 1008, 286-297 (1995). MSC: 94A60 05A05 PDF BibTeX XML Cite \textit{S. Vaudenay}, Lect. Notes Comput. Sci. 1008, 286--297 (1995; Zbl 0939.94542) Full Text: DOI OpenURL
Bellare, Mihir; Goldreich, Oded; Goldwasser, Shafi Incremental cryptography: The case of hashing and signing. (English) Zbl 0939.94530 Desmedt, Yvo G. (ed.), Advances in cryptology - CRYPTO ’94. 14th annual international cryptology conference, Santa Barbara, CA, USA, August 21-25, 1994. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 839, 216-233 (1994). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Bellare} et al., Lect. Notes Comput. Sci. 839, 216--233 (1994; Zbl 0939.94530) OpenURL
Russell, Alexander Necessary and sufficient conditions for collision-free hashing. (English) Zbl 0817.94014 Brickell, Ernest F. (ed.), Advances in cryptology - CRYPTO ’92. 12th annual international cryptology conference, Santa Barbara, CA, USA, August 16-20, 1992. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 740, 433-441 (1993). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Russell}, Lect. Notes Comput. Sci. 740, 433--441 (1993; Zbl 0817.94014) OpenURL
Zheng, Yuliang; Matsumoto, Tsutomu; Imai, Hideki Duality between two cryptographic primitives. (English) Zbl 0729.94014 Applied algebra, algebraic algorithms and error-correcting codes, Proc. 8th Int. Conf., AAECC-8, Tokyo/Jap. 1990, Lect. Notes Comput. Sci. 508, 379-390 (1991). MSC: 94A60 PDF BibTeX XML OpenURL