{"_id":"DNaAohtfDMK75TGT4","bibbaseid":"applebaum-widder-relatedkeysecurepseudorandomfunctionsthecaseofadditiveattacks-2014","downloads":0,"creationDate":"2018-06-23T23:31:51.982Z","title":"Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks","author_short":["Applebaum, B.","Widder, E."],"year":2014,"bibtype":"article","biburl":"https://dblp.org/pid/46/1698.bib","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Benny"],"propositions":[],"lastnames":["Applebaum"],"suffixes":[]},{"firstnames":["Eyal"],"propositions":[],"lastnames":["Widder"],"suffixes":[]}],"title":"Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks","journal":"IACR Cryptology ePrint Archive","volume":"2014","pages":"478","year":"2014","url":"http://eprint.iacr.org/2014/478","timestamp":"Thu, 08 Jun 2017 01:00:00 +0200","biburl":"https://dblp.org/rec/bib/journals/iacr/ApplebaumW14","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/iacr/ApplebaumW14,\n author = {Benny Applebaum and\n Eyal Widder},\n title = {Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks},\n journal = {{IACR} Cryptology ePrint Archive},\n volume = {2014},\n pages = {478},\n year = {2014},\n url = {http://eprint.iacr.org/2014/478},\n timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},\n biburl = {https://dblp.org/rec/bib/journals/iacr/ApplebaumW14},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Applebaum, B.","Widder, E."],"key":"DBLP:journals/iacr/ApplebaumW14","id":"DBLP:journals/iacr/ApplebaumW14","bibbaseid":"applebaum-widder-relatedkeysecurepseudorandomfunctionsthecaseofadditiveattacks-2014","role":"author","urls":{"Paper":"http://eprint.iacr.org/2014/478"},"downloads":0},"search_terms":["related","key","secure","pseudorandom","functions","case","additive","attacks","applebaum","widder"],"keywords":[],"authorIDs":[],"dataSources":["2xaNXwf2c7EGDLe8d"]}