Sciweavers

81
Voted
TIT
2010
121views Education» more  TIT 2010»
14 years 3 months ago
Power of a public random permutation and its application to authenticated encryption
In this paper, we first show that many independent pseudorandom permutations over {0, 1}n can be obtained from a single public random permutation and secret n bits. We next prove ...
Kaoru Kurosawa