Sign in

Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys.

Itai DinurOrr DunkelmanNathan KellerAdi Shamir
Published in: ASIACRYPT (1) (2014)
Keyphrases
  • secret key
  • hash functions
  • key agreement
  • provably secure
  • model selection