Return to Article Details Beyond-Birthday-Bound Secure Cryptographic Permutations from Ideal Ciphers with Long Keys Download Download PDF