Return to Article Details
Beyond-Birthday-Bound Secure Cryptographic Permutations from Ideal Ciphers with Long Keys
Download
Download PDF