@inproceedings{kang:hal-01400917, TITLE = {{A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations}}, AUTHOR = {Kang, Ju-Sung and Kim, Nayoung and Ju, Wangho and Yi, Ok-Yeon}, URL = {https://inria.hal.science/hal-01400917}, NOTE = {Part 2: Cryptography and Cryptanalysis}, BOOKTITLE = {{8th IFIP International Workshop on Information Security Theory and Practice (WISTP)}}, ADDRESS = {Heraklion, Crete, Greece}, EDITOR = {David Naccache and Damien Sauveron}, PUBLISHER = {{Springer}}, SERIES = {Information Security Theory and Practice. Securing the Internet of Things}, VOLUME = {LNCS-8501}, PAGES = {10-23}, YEAR = {2014}, MONTH = Jun, DOI = {10.1007/978-3-662-43826-8\_2}, KEYWORDS = {Privacy ; Authenticity ; Key expansion function ; Keying material ; Provable security ; Pseudorandomness ; PRF ; PRP}, PDF = {https://inria.hal.science/hal-01400917/file/978-3-662-43826-8_2_Chapter.pdf}, HAL_ID = {hal-01400917}, HAL_VERSION = {v1}, }