Login / Signup
Constructions of Beyond-Birthday Secure PRFs from Random Permutations, Revisited.
Jiehui Nan
Ping Zhang
Honggang Hu
Published in:
Entropy (2021)
Keyphrases
</>
chosen plaintext
lightweight
uniformly distributed
security analysis
authentication protocol
database
neural network
real world
genetic algorithm
information systems
evolutionary algorithm
probability distribution
intrusion detection
security issues
security requirements