-
1
-
-
0019669180
-
An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems
-
C. A. Asmuth and G. R. Blakley. An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems. Comp. and Maths, with Appls., 7:447-450, 1981.
-
(1981)
Comp. and Maths, with Appls.
, vol.7
, pp. 447-450
-
-
Asmuth, C.A.1
Blakley, G.R.2
-
2
-
-
33244489573
-
Security amplification by construction: The case of doubly-iterated, ideal ciphers
-
B. Aiello, M. Bellare, G. Di Crescenzo, and R. Venkatesan, Security amplification by construction: the case of doubly-iterated, ideal ciphers, Proc. of CRYPTO 98.
-
Proc. of CRYPTO 98.
-
-
Aiello, B.1
Bellare, M.2
Di Crescenzo, G.3
Venkatesan, R.4
-
4
-
-
84864840163
-
-
Advances in Cryptology - EUROCRYPT 2002, Springer-Verlag
-
Also in Advances in Cryptology - EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 83-107. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 83-107
-
-
-
5
-
-
84957714601
-
Robustness principles for public key protocols
-
Proceedings of Int'l. Conference on Advances in Cryptology (CRYPTO 95), Springer-Verlag
-
Ross Anderson, Roger Needham. Robustness Principles for Public Key Protocols. In Proceedings of Int'l. Conference on Advances in Cryptology (CRYPTO 95), Vol. 963 of Lecture Notes in Computer Science, pp. 236-247, Springer-Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.963
, pp. 236-247
-
-
Anderson, R.1
Needham, R.2
-
6
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
Jan.
-
Martin Abadi, Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering, 22, 1 (Jan.), 1996, pp. 6-15.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
7
-
-
84957693225
-
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1
-
Advances in Cryptology - CRYPTO '98, Springer
-
Daniel Bleichenbacher. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1. In Advances in Cryptology - CRYPTO '98, LNCS 1462, pages 1-12. Springer, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 1-12
-
-
Bleichenbacher, D.1
-
8
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
M.Bellare, A.Desai, E. Jokipii, P.Rogaway: A Concrete Security Treatment of Symmetric Encryption, Proceedings of the 38th IEEE Symposium on Foundations of Computer Science (FOCS), pp. 394-403, 1997. Revised version at http://www-cse.ucsd.edu/users/mihir/papers/sym-enc.html.
-
(1997)
Proceedings of the 38th IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
9
-
-
85032128552
-
The security of cipher block chaining
-
Dec
-
Mihir Bellare, Joe Kilian and Phil Rogaway, The security of cipher block chaining, Journal of Computer and System Sciences, Vol. 61, No. 3, Dec 2000, pp. 362-399.
-
(2000)
Journal of Computer and System Sciences
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
10
-
-
33645606544
-
-
Extended abstract in Advances in Cryptology - Crypto 94 Proceedings, Y. Desmedt ed, Springer-Verlag
-
Extended abstract in Advances in Cryptology - Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed, Springer-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.839
-
-
-
11
-
-
0003278940
-
Authenticated encryption: Relations among notions and analysis of the generic construction paradigm
-
T. Okamoto, editor, Asiacrypt 2000, Springer-Verlag, Berlin Germany, Dec.
-
Mihir Bellare and Chanathip Namprempre. Authenticated encryption: Relations among notions and analysis of the generic construction paradigm. In T. Okamoto, editor, Asiacrypt 2000, volume 1976 of LNCS, pages 531-545. Springer-Verlag, Berlin Germany, Dec. 2000.
-
(2000)
LNCS
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
12
-
-
84958663551
-
Collision-resistant hashing: Towards making UOWHFs practical
-
Extended abstract was in Advances in Cryptology- Crypto 97 Proceedings, B. Kaliski ed, Springer-Verlag
-
Mihir Bellare and Phillip Rogaway, Collision-Resistant Hashing: Towards Making UOWHFs Practical, Extended abstract was in Advances in Cryptology- Crypto 97 Proceedings, Lecture Notes in Computer Science Vol. 1294, B. Kaliski ed, Springer-Verlag, 1997. Full paper available at http://www.cs.ucsd.edu/users/mihir/papers/tcr-hash.html.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
-
-
Bellare, M.1
Rogaway, P.2
-
13
-
-
84958982846
-
Formal proofs for the security of signcryption
-
David Naccache and Pascal Pailler, editors, 5th International Workshop on Practice and Theory in Public Key Cryptosystems - PKC 2002
-
Joonsang Baek, Ron Steinfeld, and Yuliang Zheng. Formal proofs for the security of signcryption. In David Naccache and Pascal Pailler, editors, 5th International Workshop on Practice and Theory in Public Key Cryptosystems - PKC 2002, pp. 80-98, LNCS Vol. 2274, 2002.
-
(2002)
LNCS
, vol.2274
, pp. 80-98
-
-
Baek, J.1
Steinfeld, R.2
Zheng, Y.3
-
15
-
-
33645605463
-
Enhancing the strength of conventional cryptosystems
-
November
-
Ivan B. Damgård, Lars Ramkilde Knudsen. Enhancing the Strength of Conventional Cryptosystems, BRICS report RS-94-38, November 1994.
-
(1994)
BRICS Report
, vol.RS-94-38
-
-
Damgård, I.B.1
Knudsen, L.R.2
-
17
-
-
85016692748
-
On the existence of statistically hiding bit commitment schemes and fail-stop signatures
-
Crypto '93, Springer-Verlag, Berlin
-
Ivan B. Damgård, Torben P. Pedersen, Birgit Pfitzmann: On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures; Crypto '93, LNCS 773, Springer-Verlag, Berlin 1994, 250-265.
-
(1994)
LNCS
, vol.773
, pp. 250-265
-
-
Damgård, I.B.1
Pedersen, T.P.2
Pfitzmann, B.3
-
20
-
-
33645606157
-
-
National Institute of Standards and Technology, Federal Information Processing Standards Publication, FIPS Pub 180-1: Secure Hash Standard (SHA-1), April 17, (1995), 14 pages
-
National Institute of Standards and Technology, Federal Information Processing Standards Publication, FIPS Pub 180-1: Secure Hash Standard (SHA-1), April 17, (1995), 14 pages.
-
-
-
-
21
-
-
0003979335
-
-
(Basic Tools), ISBN 0-521-79172-3, Cambridge University Press, June
-
Oded Goldreich, The Foundations of Cryptography, Volume 1 (Basic Tools), ISBN 0-521-79172-3, Cambridge University Press, June 2001.
-
(2001)
The Foundations of Cryptography
, vol.1
-
-
Goldreich, O.1
-
24
-
-
0025742358
-
Security preserving amplification of randomness
-
IEEE Computer Society Press
-
Oded Goldreich, R. Impagliazzo, L. Levin, R. Venkatesen, D. Zuckerman. "Security preserving amplification of randomness", 31st Annual Symposium on Foundations of Computer Science, IEEE Computer Society Press, (1990), 318-326.
-
(1990)
31st Annual Symposium on Foundations of Computer Science
, pp. 318-326
-
-
Goldreich, O.1
Impagliazzo, R.2
Levin, L.3
Venkatesen, R.4
Zuckerman, D.5
-
25
-
-
0021409284
-
Probabilistic Encryption
-
Shafi Goldwasser and Silvio Micali. "Probabilistic Encryption, " JCSS (28), 1984, 270-299.
-
(1984)
JCSS
, Issue.28
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
26
-
-
35048899238
-
Universal reencryption for mixnets
-
Tatsuaki Okamoto, editor, RSA Conference Cryptographers' Track, Springer-Verlag, San Francisco, California, USA, February
-
Philippe Golle, Markus Jakobsson, Ari Juels, and Paul Syverson. Universal reencryption for mixnets. In Tatsuaki Okamoto, editor, RSA Conference Cryptographers' Track, volume 2964 of LNCS, Springer-Verlag, pages 163-178, San Francisco, California, USA, February 2004.
-
(2004)
LNCS
, vol.2964
, pp. 163-178
-
-
Golle, P.1
Jakobsson, M.2
Juels, A.3
Syverson, P.4
-
27
-
-
0037519332
-
Practical and provably-secure commitment schemes from collision free hashing in Advances in Cryptology - CRYPTO96
-
Springer-Verlag
-
Shai Halevi and Silvio Micali, "Practical and Provably-Secure Commitment Schemes from Collision Free Hashing", in Advances in Cryptology - CRYPTO96, Lecture Notes in Computer Science 1109, Springer-Verlag, 1996, pp. 201-215.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 201-215
-
-
Halevi, S.1
Micali, S.2
-
28
-
-
0345253860
-
Construction of a pseudorandom generator from any one-way function
-
Johan Hastad, Rudich Impagliazzo, Leonid A. Levin, and Mike Luby, Construction of a Pseudorandom Generator from any One-Way Function. SIAM Journal on Computing, Vol. 28, No. 4, pp. 1364-1396, 1999.
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
29
-
-
8344289276
-
Public randomness in cryptography
-
proceedings of CRYPTO 1992, October
-
Amir Herzberg and Mike Luby, "Public Randomness in Cryptography", proceedings of CRYPTO 1992, ICSI technical report TR-92-068, October, 1992.
-
(1992)
ICSI Technical Report
, vol.TR-92-068
-
-
Herzberg, A.1
Luby, M.2
-
30
-
-
33645587661
-
-
EE Pub. no. 576, Dept of Electrical Engineering, Technion, Haifa, Israel, Feb.
-
Amir Herzberg and Shlomit Pinter, "Composite Ciphers", EE Pub. no. 576, Dept of Electrical Engineering, Technion, Haifa, Israel, Feb. 1986.
-
(1986)
Composite Ciphers
-
-
Herzberg, A.1
Pinter, S.2
-
31
-
-
84880901653
-
The order of encryption and authentication for protecting communications (or: How Secure Is SSL?)
-
Crypto '01, J. Kilian ed., Springer-Verlag
-
Hugo Krawczyk, "The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)," In Crypto '01, pp. 310-331, LNCS Vol. 2139, J. Kilian ed., Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 310-331
-
-
Krawczyk, H.1
-
34
-
-
0027308007
-
Cascade ciphers: The importance of being first
-
U.M. Maurer and J.L. Massey, Cascade ciphers: the importance of being first, Journal of Cryptology, Vol. 6, No. 1, pp. 55-61, 1993.
-
(1993)
Journal of Cryptology
, vol.6
, Issue.1
, pp. 55-61
-
-
Maurer, U.M.1
Massey, J.L.2
-
35
-
-
84944878354
-
-
Section 9.2.6, CRC Press, ISBN 0-8493-8523-7, October
-
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of Applied Cryptography, Section 9.2.6, CRC Press, ISBN 0-8493-8523-7, October 1996. Available online at http://www.cacr.math.uwaterloo.ca/hac/.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
37
-
-
0004035649
-
-
Network Working Group, Internet Engineering Task Force (IETF)
-
T. Dierks, C. Allen, The TLS Protocol: Version 1.0, Network Working Group, Internet Engineering Task Force (IETF). Available online at http://www.ietf.org/rfc/rfc2246.txt.
-
The TLS Protocol: Version 1.0
-
-
Dierks, T.1
Allen, C.2
-
39
-
-
0018545449
-
How to share a secret
-
Adi Shamir, How to share a secret, Comm. of the ACM, 22(11):612-613, 1979.
-
(1979)
Comm. of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
41
-
-
84948976239
-
Using hash functions as a hedge against chosen ciphertext attacks
-
Adv. in Cryptology - Proc. of Eurocrypt '2000
-
Victor Shoup, Using hash functions as a hedge against chosen ciphertext attacks, Adv. in Cryptology - Proc. of Eurocrypt '2000, LNCS 1807, pp. 275-288.
-
LNCS
, vol.1807
, pp. 275-288
-
-
Shoup, V.1
-
42
-
-
84880883264
-
Improved online/online signature schemes
-
Joe Killian, editor, Proceedings of Crypto 01, Springer-Verlag, August
-
Adi Shamir and Yael Tauman. Improved online/online signature schemes. In Joe Killian, editor, Proceedings of Crypto 01, volume 2139 of LNCS, pages 355-367. Springer-Verlag, August 2001.
-
(2001)
LNCS
, vol.2139
, pp. 355-367
-
-
Shamir, A.1
Tauman, Y.2
-
43
-
-
63449122349
-
Digital signcryption or how to achieve cost(signature+encryption) ≪ cost(signature)+cost(encryption)
-
Advances in Cryptology - CRYPTO'97, Berlin, New York, Tokyo, Springer-Verlag
-
Yuliang Zheng, Digital signcryption or how to achieve cost(signature+encryption) ≪ cost(signature)+cost(encryption), in Advances in Cryptology - CRYPTO'97, Berlin, New York, Tokyo, 1997, vol. 1294 of Lecture Notes in Computer Science, pp. 165-179, Springer-Verlag.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
|