A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations
Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-662-43826-8_2
Full Text
Open PDFAbstract
Available in full text
Date
January 1, 2014
Authors
Publisher
Springer Berlin Heidelberg