Published in

Springer, Journal of Cryptology, 4(31), p. 917-964, 2018

DOI: 10.1007/s00145-017-9274-8

Springer, Lecture Notes in Computer Science, p. 77-94, 2014

DOI: 10.1007/978-3-662-44371-2_5

Links

Tools

Export citation

Search in Google Scholar

Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier

This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Green circle
Preprint: archiving allowed
Orange circle
Postprint: archiving restricted
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

International audience