Login / Signup
Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks.
Mihir Bellare
David Cash
Published in:
IACR Cryptol. ePrint Arch. (2010)
Keyphrases
</>
pseudorandom
provably secure
stream cipher
blind signature
public key
secret key
key management