Login / Signup
Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations.
Liqing Yu
Yusai Wu
Yu Yu
Zhenfu Cao
Xiaolei Dong
Published in:
TCC (1) (2023)
Keyphrases
</>
block cipher
high security
security protocols
stream cipher
chosen plaintext
lightweight
s box
hash functions
image encryption
secret key
access control
network security
information security
information assurance
database
theorem proving
bayesian networks
formal proof
neural network