Author of the publication

Designing tweakable enciphering schemes using public permutations.

, , and . Adv. Math. Commun., 17 (4): 771-798 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Another Look at XCB., , and . IACR Cryptology ePrint Archive, (2013)An Improved Security Bound for HCTR., and . FSE, volume 5086 of Lecture Notes in Computer Science, page 289-302. Springer, (2008)Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware., , and . INDOCRYPT, volume 4859 of Lecture Notes in Computer Science, page 414-424. Springer, (2007)HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach., and . INDOCRYPT, volume 4329 of Lecture Notes in Computer Science, page 287-302. Springer, (2006)Objective reduction using a feature selection technique., , and . GECCO, page 673-680. ACM, (2008)Designing tweakable enciphering schemes using public permutations., , and . Adv. Math. Commun., 17 (4): 771-798 (2023)On the security of TrCBC., and . Inf. Process. Lett., (2023)A Cryptographic Study of Tokenization Systems., , and . SECRYPT, page 393-398. SciTePress, (2014)Evaluating Bernstein-Rabin-Winograd Polynomials., , and . IACR Cryptology ePrint Archive, (2017)Double Ciphertext Mode : A Proposal for Secure Backup., and . IACR Cryptology ePrint Archive, (2010)