Author of the publication

Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the ^2 Method.

, and . EUROCRYPT (1), volume 10820 of Lecture Notes in Computer Science, page 387-412. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On an extremal hypergraph problem related to combinatorial batch codes., and . Discret. Appl. Math., (2014)Combinatorial Batch Codes: A Lower Bound and Optimal Constructions, , and . CoRR, (2011)Note on an Extremal Hypergraph Problem Related to Combinatorial Batch Codes, and . CoRR, (2012)Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the ^2 Method., and . EUROCRYPT (1), volume 10820 of Lecture Notes in Computer Science, page 387-412. Springer, (2018)Combinatorial batch codes: A lower bound and optimal constructions., , and . Adv. Math. Commun., 6 (2): 165-174 (2012)On Some Permutation Binomials of the Form $x^2^n-1k+1 +ax$ over $F_2^n$ : Existence and Count., , and . WAIFI, volume 7369 of Lecture Notes in Computer Science, page 236-246. Springer, (2012)Revisiting Variable Output Length XOR Pseudorandom Function., and . IACR Trans. Symmetric Cryptol., 2018 (1): 314-335 (2018)A Note on the Chi-square Method : A Tool for Proving Cryptographic Security., and . IACR Cryptology ePrint Archive, (2019)Derandomized Construction of Combinatorial Batch Codes.. FCT, volume 9210 of Lecture Notes in Computer Science, page 269-282. Springer, (2015)Luby-Rackoff Backwards with More Users and More Security., and . ASIACRYPT (3), volume 13092 of Lecture Notes in Computer Science, page 345-375. Springer, (2021)