메뉴 건너뛰기




Volumn 3378, Issue , 2005, Pages 556-577

Entropic security and the encryption of high entropy messages

Author keywords

[No Author keywords available]

Indexed keywords

ENTROPY; GRAPH THEORY; INFORMATION THEORY; SEMANTICS;

EID: 24144460521     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30576-7_30     Document Type: Conference Paper
Times cited : (79)

References (25)
  • 1
    • 0025535378 scopus 로고
    • Simple constructions of almost k-wise independent random variables
    • Noga Alon, Oded Goldreich, Johan Håstad, René Peralta: Simple Constructions of Almost k-Wise Independent Random Variables. FOCS 1990: 544-553
    • (1990) FOCS , pp. 544-553
    • Alon, N.1    Goldreich, O.2    Håstad, J.3    Peralta, R.4
  • 3
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C. Bennett, G. Brassard, and J. Robert. Privacy Amplification by Public Discussion. SIAM J. on Computing, 17(2), pp. 210-229, 1988.
    • (1988) SIAM J. on Computing , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.1    Brassard, G.2    Robert, J.3
  • 5
    • 0842305659 scopus 로고    scopus 로고
    • Towards realizing random oracles: Hash functions that hide all partial information
    • R. Canetti. Towards realizing random oracles: Hash functions that hide all partial information. In Crypto 1997.
    • Crypto 1997
    • Canetti, R.1
  • 7
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Ran Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. Proc. IEEE Symp. on Foundations of Computer Science, 2001, pp. 136-145.
    • (2001) Proc. IEEE Symp. on Foundations of Computer Science , pp. 136-145
    • Canetti, R.1
  • 9
    • 84860984597 scopus 로고    scopus 로고
    • Entropic security and the encryption of high entropy messages
    • Full version of this paper
    • Y. Dodis, and A. Smith. Entropic Security and the Encryption of High Entropy Messages. Full version of this paper. Available at IACR Cryptology ePrint Archive, report 2004/219, at http://eprint.iacr.org/2004/219/.
    • IACR Cryptology EPrint Archive, Report , vol.2004 , Issue.219
    • Dodis, Y.1    Smith, A.2
  • 10
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • April
    • S. Goldwasser and S. Micali. Probabilistic encryption. JCSS, 28(2), pp. 270-299, April 1984.
    • (1984) JCSS , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 12
    • 0031504510 scopus 로고    scopus 로고
    • Tiny families of functions with random properties: A quality-size trade-off for hashing
    • Oded Goldreich, Avi Wigderson: Tiny families of functions with random properties: A quality-size trade-off for hashing. Random Structures and Algorithms 11(4): 315-343 (1997)
    • (1997) Random Structures and Algorithms , vol.11 , Issue.4 , pp. 315-343
    • Goldreich, O.1    Wigderson, A.2
  • 16
    • 84991939136 scopus 로고
    • LFSR-based hashing and authentication
    • H. Krawczyk. LFSR-Based Hashing and Authentication. In Proc. CRYPTO'94, p. 129-139, 1994.
    • (1994) Proc. CRYPTO'94 , pp. 129-139
    • Krawczyk, H.1
  • 18
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • U. Maurer. Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher. J. Cryptology, 5(1), pp. 53-66, 1992.
    • (1992) J. Cryptology , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.1
  • 19
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion
    • U. Maurer. Secret Key Agreement by Public Discussion. IEEE Trans. on Info. Theory, 39(3):733-742, 1993.
    • (1993) IEEE Trans. on Info. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 20
    • 0027641832 scopus 로고
    • Small-bias probability spaces: Efficient constructions and applications
    • J. Naor, M. Naor. Small-Bias Probability Spaces: Efficient Constructions and Applications. In SIAM J. Comput. 22(4): 838-856 (1993).
    • (1993) SIAM J. Comput. , vol.22 , Issue.4 , pp. 838-856
    • Naor, J.1    Naor, M.2
  • 21
    • 0030086632 scopus 로고    scopus 로고
    • Randomness is linear in space
    • N. Nisan, D. Zuckerman. Randomness is Linear in Space. In JCSS, 52(1), pp. 43-52, 1996.
    • (1996) JCSS , vol.52 , Issue.1 , pp. 43-52
    • Nisan, N.1    Zuckerman, D.2
  • 22
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • B. Pfitzmann, M. Waidner. A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. In Proc. IEEE Symp. on Security and Privacy, 2001, 184-200.
    • (2001) Proc. IEEE Symp. on Security and Privacy , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2
  • 25
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. Shannon. Communication Theory of Secrecy systems. In Bell Systems Technical J., 28:656-715, 1949. Note: The material in this paper appeared originally in a confidential report 'A Mathematical Theory of Cryptography', dated Sept. 1, 1945, which has now been declassified.
    • (1949) Bell Systems Technical J. , vol.28 , pp. 656-715
    • Shannon, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.