Login / Signup
Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
Published in:
J. Cryptol. (2016)
Keyphrases
</>
encryption scheme
chosen ciphertext
standard model
security analysis
chosen plaintext attack
database
databases
similarity measure
digital libraries
data management
ciphertext