Tag: pseudo-random-permutation

Found 83 results for 'pseudo-random-permutation'.

1) keys - How are the keys used in cryptography generated?
2) hash - Test the randomness of a random permutations, that was generated without Fisher-Yates?
3) block-cipher - How random are permutations generated from Feistel networks with a small number of rounds?
4) pseudo-random-function - Give a distinguisher to differentiate between PRP and RPO
5) pseudo-random-function - How to prove the PRF, $F(k,x) = (k \wedge x ) \oplus k$ is PRP?
6) provable-security - Is the inverse of a secure PRP, also a secure PRP?
7) block-cipher - Using a PRP $\pi: \{0,1\}^{16} \to \{0,1\}^{16}$ to construct an ideal cipher
8) aes - Formally, what is AES?
9) pseudo-random-permutation - How to pick up random number within range using pseudo-random number sequence
10) pseudo-random-permutation - Random permutation of bit strings of length $n$, where $n$ can be any positive integer?
11) encryption - Is there any fundamental difference between the block cipher operations encryption and decryption?
12) one-way-function - Unkeyed, fast, one-way PRP
13) pseudo-random-function - Number of possible functions for a PRP
14) block-cipher - Pseudorandom permutations on domains of arbitrary (i.e. not a power of 2) size
15) encryption - Why are stream ciphers not PRPs?
16) block-cipher - How is a PRP different from PRF? Both can be inverted to get the same input
17) security-definition - Does encryption using PRP mean indistinguishable encryption against an eavesdropper?
18) hash - What are the properties of a function based on multiple iterations of a pseudo-random permutation?
19) security-definition - Example of a PRP that is not a strong PRP
20) pseudo-random-permutation - Is it possible to make use of a pseudo-random permutation to construct a one-way compression function?
21) random-number-generator - How to combine $n$ 'less random' bits to generate one 'more random' bit?
22) pseudo-random-function - Can we use a PRF as a PRP?
23) random-number-generator - Random Permutation polynomial
24) pseudo-random-permutation - Generating a 30-32-bit PRP
25) encryption - A strange phenomenon of the composition of permutations of order 2
26) block-cipher - Luby-Rackoff theorem for Generalized Feistel
27) encryption - Why I can't permutate an email and get away with it?
28) feistel-network - Is 3 rounds of Feistel enough for making a PRP?
29) pseudo-random-permutation - What is the difference between a permutation and a shuffle (transposition cipher)
30) cryptanalysis - Impact of distinguishing between random text and cipher text?
31) hash - Can a block cipher with fixed point permutations be a good PRP?
32) pseudo-random-function - Security of OFB mode if PRP is used instead of PRF
33) hash - What is the expected number of different sequences of bits in the collection that contains $2^{800}$ elements?
34) encryption - Permuting Small Sized Set in Practice
35) aes - Can we always find a key to map a given plaintext block to a given ciphertext block in AES?
36) encryption - Two Round Feistel network
37) pseudo-random-permutation - Does there exist a deterministic, invertible function $\{0,1\}^n \rightarrow \{0,1\}^n$ that is not a bijection?
38) algorithm-design - How to contruct a pseudorandom with a specific property
39) pseudo-random-function - Indistinguishable encryptions in the presence of an eavesdropper
40) cryptanalysis - Permuted vectors
41) one-way-function - Generator of one-way functions
42) entropy - Expected entropy in $P(x)\oplus x$ for random $x$, where $P$ is a random permutation
43) block-cipher - The different bounds of PRP/PRF switching lemma
44) encryption - What is the prp-advantage of a $2^{80}$-time adversary attacking AES-256?
45) block-cipher - Security of block cipher PRP(k⊕m)⊕k
46) block-cipher - Turning PRPs in PRGs with a counter
47) algorithm-design - Is there a method to encrypt relations in between values of a cyclic value set and generate values out of this set with pseudo RNG? (all at user PC)
48) authenticated-encryption - Arbitrary width pseudorandom permutation
49) implementation - How does this generate a permutation?
50) symmetric - Pseudo random permutation for arbitrary size domains