共 22 条
- [1] Bellare M, 1998, LECT NOTES COMPUT SC, V1403, P266, DOI 10.1007/BFb0054132
- [2] Bellare M., 1999, IACR Cryptol. ePrint Arch, P24
- [3] Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the x2 Method [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT I, 2018, 10820 : 387 - 412
- [4] The Indistinguishability of the XOR of k Permutations [J]. FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 285 - 302
- [5] Information-Theoretic Indistinguishability via the Chi-Squared Method [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III, 2017, 10403 : 497 - 523
- [6] Dodis Y, 2009, LECT NOTES COMPUT SC, V5665, P104, DOI 10.1007/978-3-642-03317-9_7
- [7] Dodis Y, 2009, LECT NOTES COMPUT SC, V5479, P371, DOI 10.1007/978-3-642-01001-9_22
- [9] GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 109 - 119
- [10] Gueron Shay., 2017, IACR Cryptology ePrint Archive, V2017, P168