Login / Signup
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
Published in:
ASIACRYPT (1) (2014)
Keyphrases
</>
secret key
hash functions
key agreement
provably secure
model selection