How to build pseudorandom functions from public random permutations
dc.contributor.author | Chen, Y. | |
dc.contributor.author | Lambooij, E. | |
dc.contributor.author | Mennink, B. | |
dc.date.accessioned | 2021-10-27T08:00:42Z | |
dc.date.available | 2021-10-27T08:00:42Z | |
dc.date.issued | 2019 | |
dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/32699 | |
dc.source | IIOimport | |
dc.title | How to build pseudorandom functions from public random permutations | |
dc.type | Proceedings paper | |
dc.date.embargo | 9999-12-31 | |
dc.source.peerreview | yes | |
dc.source.beginpage | 266 | |
dc.source.endpage | 293 | |
dc.source.conference | Advances in Cryptology - CRYPTO 2019 | |
dc.source.conferencedate | 18/08/2019 | |
dc.source.conferencelocation | Santa Barbara, CA USA | |
dc.identifier.url | https://doi.org/10.1007/978-3-030-26948-7_10 | |
imec.availability | Published - open access | |
imec.internalnotes | Lecture Notes in Computer Science; Vol. 11692 |