@dblp

Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the ^2 Method.

, and . EUROCRYPT (1), volume 10820 of Lecture Notes in Computer Science, page 387-412. Springer, (2018)

Links and resources

Tags