Cited By
View all- Jha ANandi M(2022)A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRFEntropy10.3390/e2404046224:4(462)Online publication date: 26-Mar-2022
- Guo CWang L(2018)Revisiting Key-Alternating Feistel Ciphers for Shorter Keys and Multi-user SecurityAdvances in Cryptology – ASIACRYPT 201810.1007/978-3-030-03326-2_8(213-243)Online publication date: 2-Dec-2018
- Nachef VPatarin JVolte ENachef VPatarin JVolte E(2017)Luby-Rackoff TheoremsFeistel Ciphers10.1007/978-3-319-49530-9_4(45-53)Online publication date: 22-Feb-2017
- Show More Cited By