Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,211,205 papers from all fields of science
Search
Sign In
Create Free Account
Pseudorandom permutation
Known as:
Pseudo-random permutation
In cryptography, the term pseudorandom permutation, abbreviated PRP, refers to a function that cannot be distinguished from a random permutation…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Block cipher
CBC-MAC
Computer security
Cryptography
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Trick or Tweak: On the (In)security of OTR's Tweaks
Raphael Bost
,
Olivier Sanders
International Conference on the Theory and…
2016
Corpus ID: 14046881
Tweakable blockcipher (TBC) is a powerful tool to design authenticated encryption schemes as illustrated by Minematsu’s Offset…
Expand
2014
2014
XLS is Not a Strong Pseudorandom Permutation
M. Nandi
International Conference on the Theory and…
2014
Corpus ID: 9331680
In FSE 2007, Ristenpart and Rogaway had described a generic method XLS to construct a length-preserving strong pseudorandom…
Expand
2009
2009
On the pseudorandomness of Shabal ’ s keyed permutation
Jean-Philippe Aumasson
2009
Corpus ID: 53680357
We report observations suggesting that the permutation used in Shabal does not behave pseudorandomly. This does not affect the…
Expand
2009
2009
The Chameleon Cipher-192 (CC-192) - A Polymorphic Cipher
M. Saeb
International Conference on Security and…
2009
Corpus ID: 18795979
The Chameleon Cipher-192 is a polymorphic cipher that utilizes a variable word size and variable-size users key. In the…
Expand
2007
2007
How to Construct Super-Pseudorandom Permutations with Short Keys
Tetsu Iwata
,
K. Kurosawa
IEICE Transactions on Fundamentals of Electronics…
2007
Corpus ID: 36798642
It is known that a super-pseudorandom permutation can be constructed from a pseudorandom function f and two universal hash…
Expand
Highly Cited
2006
Highly Cited
2006
Wavelet-Based Audio Watermarking Using Adaptive Tabu Search
N. Sriyingyong
,
K. Attakitmongcol
International Symposium on Wireless Pervasive…
2006
Corpus ID: 17502783
In this paper, we present an algorithm for robust audio watermarking in wavelet transform domain. Using Daubechies wavelet…
Expand
2004
2004
Image Watermarking Based On Wavelet Packet Transform With Best Tree
P. Kumhom
,
S. On-rit
,
K. Chamnongthai
2004
Corpus ID: 36239550
This paper proposes a watermarking embedding and extracting methods in the frequency domain based on a selection of a high…
Expand
2003
2003
Permutation modulation for fading channels
A. Nordio
,
E. Viterbo
10th International Conference on…
2003
Corpus ID: 61987237
Permutation codes are special spherical codes designed for the band-limited Gaussian channel. Their application to fading…
Expand
1994
1994
Construction of pseudorandom permutations
Yasuhiro Ohnishi
,
Akira Maruoka
Systems and Computers in Japan
1994
Corpus ID: 2062732
The permutation from {0, 1}2n to {0, 1}2n represented by S(f) in DES (Data Encryption Standard) is used as the basic operation…
Expand
1986
1986
Capability of the error-trapping technique in decoding cyclic codes
A. Benyamin-Seeyar
,
S. Shiva
,
V. Bhargava
IEEE Transactions on Information Theory
1986
Corpus ID: 34178336
The error-trapping technique, whenever applicable, is easy to implement. Here we investigate the capability of this technique…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE