Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Wangho Ju
A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Related publications
A Construction for Super Pseudorandom Permutations From a Single Pseudorandom Function
Pseudorandom Functions and Lattices
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Weak Pseudorandom Functions in Minicrypt
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Unbelievable Security Matching AES Security Using Public Key Systems
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations)
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Defect Level Estimation for Pseudorandom Testing Using Stochastic Analysis
VLSI Design
Electronic Engineering
Computer Graphics
Hardware
Electrical
Architecture
Computer-Aided Design
Parallelizable Rate-1 Authenticated Encryption From Pseudorandom Functions
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Javascript Security Using Cryptographic Hash Functions
Advanced Information Systems
The Complexity of Constructing Pseudorandom Generators From Hard Functions
Computational Complexity
Mathematics
Computational Mathematics
Theoretical Computer Science
Computational Theory