Sciweavers

1696 search results - page 24 / 340
» Permuted function matching
Sort
View
FSE
2004
Springer
110views Cryptology» more  FSE 2004»
15 years 3 months ago
VMPC One-Way Function and Stream Cipher
Abstract. A simple one-way function along with its proposed application in symmetric cryptography is described. The function is computable with three elementary operations on permu...
Bartosz Zoltak
EJC
2008
14 years 10 months ago
Enumeration of almost polynomial rational functions with given critical values
1 Rational functions and minimal factorizations of permutations Let f : C C be a rational function of degree n in one complex variable. A critical point of f is a point z C such...
Dmitri Panov, Dimitri Zvonkine
ASIACRYPT
2006
Springer
15 years 1 months ago
Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions
In this paper, we describe generic attacks on unbalanced Feistel schemes with contracting functions. These schemes are used to construct pseudo-random permutations from kn bits to ...
Jacques Patarin, Valérie Nachef, Côme...
CRYPTO
2010
Springer
151views Cryptology» more  CRYPTO 2010»
14 years 11 months ago
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
Abstract. A cryptographic primitive is leakage-resilient, if it remains secure even if an adversary can learn a bounded amount of arbitrary information about the computation with e...
Yevgeniy Dodis, Krzysztof Pietrzak
CORR
2004
Springer
97views Education» more  CORR 2004»
14 years 9 months ago
Free quasi-symmetric functions, product actions and quantum field theory of partitions
Abstract. We investigate two associative products over the ring of symmetric functions related to the intransitive and Cartesian products of permutation groups. As an application, ...
Gérard Henry Edmond Duchamp, Jean-Gabriel L...