Login / Signup
Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations.
Liqing Yu
Yusai Wu
Yu Yu
Zhenfu Cao
Xiaolei Dong
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
block cipher
high security
stream cipher
lightweight
hash functions
secret key
private key
security protocols
s box
probability distribution
security issues
image encryption
theorem prover
chosen plaintext
data security
security requirements
security policies