Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Mirror theory and its applications in crypography/



xxi, 205 pages, Content notes : Foundations -- Introduction -- Defining security -- H-technique --
Results and proofs -- The mirror theory problem -- Toying with CMTP -- CMTP for ξmax = 2 -- CMTP for general ξmax -- BMTP for ξmax = 2 -- BMTP in tweakable permutation setting -- Preliminaries for the RMTP problem -- Regular partite RMTP -- Compete RMTP --
Motivations and applications -- Applications of complete and bipartite mirror theory for ξmax =
2 -- 109
13.1 XOR1 construction: Applications of CMTP for ξmax = 2 -- Cryptographic applications of theorem -- Application of theorem 9.1 : lrw+ -- Application of theorem 11.1 : sum of r even-mansour -- Application of theorem 12.1 : 1k-dbhts --
Reflections -- Conclusion and future directions --
Appendix Mirror Theory Pseudorandom Functions Pseudorandom Permutations Beyond-birthday-bound Security Random Oracle Model H Coefficient Technique System of Equations and Non-equations Tweakable Blockciphers Information-theoretic Security

Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in