First Step: Isolating SiM Clause Samples
First Step: Isolating SiM. As a first step, we will describe an alternative authenticated encryption scheme $ AE′ based on tweakable permutations π ,..., π ←− perm(T , n), where T is 2−α- proper with respect to LFSRs ( ˜1 ˜μ and decryp- ϕ1, ϕ2). Its encryption function enc tion function dec are given in Algorithms 3 and 4, respectively, for any function . Unlike the original functions enc and dec of Algorithms 1 π˜ ∈ {π˜1,..., π˜μ} .
