메뉴 건너뛰기




Volumn 3376, Issue , 2005, Pages 172-190

On tolerant cryptographic constructions

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; SECURITY OF DATA;

EID: 24144475180     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30574-3_13     Document Type: Conference Paper
Times cited : (34)

References (44)
  • 1
    • 0019669180 scopus 로고
    • An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems
    • C. A. Asmuth and G. R. Blakley. An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems. Comp. and Maths, with Appls., 7:447-450, 1981.
    • (1981) Comp. and Maths, with Appls. , vol.7 , pp. 447-450
    • Asmuth, C.A.1    Blakley, G.R.2
  • 4
    • 84864840163 scopus 로고    scopus 로고
    • Advances in Cryptology - EUROCRYPT 2002, Springer-Verlag
    • Also in Advances in Cryptology - EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 83-107. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 83-107
  • 5
    • 84957714601 scopus 로고
    • Robustness principles for public key protocols
    • Proceedings of Int'l. Conference on Advances in Cryptology (CRYPTO 95), Springer-Verlag
    • Ross Anderson, Roger Needham. Robustness Principles for Public Key Protocols. In Proceedings of Int'l. Conference on Advances in Cryptology (CRYPTO 95), Vol. 963 of Lecture Notes in Computer Science, pp. 236-247, Springer-Verlag, 1995.
    • (1995) Lecture Notes in Computer Science , vol.963 , pp. 236-247
    • Anderson, R.1    Needham, R.2
  • 6
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • Jan.
    • Martin Abadi, Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering, 22, 1 (Jan.), 1996, pp. 6-15.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 7
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1
    • Advances in Cryptology - CRYPTO '98, Springer
    • Daniel Bleichenbacher. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1. In Advances in Cryptology - CRYPTO '98, LNCS 1462, pages 1-12. Springer, 1998.
    • (1998) LNCS , vol.1462 , pp. 1-12
    • Bleichenbacher, D.1
  • 10
    • 33645606544 scopus 로고
    • Extended abstract in Advances in Cryptology - Crypto 94 Proceedings, Y. Desmedt ed, Springer-Verlag
    • Extended abstract in Advances in Cryptology - Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed, Springer-Verlag, 1994.
    • (1994) Lecture Notes in Computer Science , vol.839
  • 11
    • 0003278940 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic construction paradigm
    • T. Okamoto, editor, Asiacrypt 2000, Springer-Verlag, Berlin Germany, Dec.
    • Mihir Bellare and Chanathip Namprempre. Authenticated encryption: Relations among notions and analysis of the generic construction paradigm. In T. Okamoto, editor, Asiacrypt 2000, volume 1976 of LNCS, pages 531-545. Springer-Verlag, Berlin Germany, Dec. 2000.
    • (2000) LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 12
    • 84958663551 scopus 로고    scopus 로고
    • Collision-resistant hashing: Towards making UOWHFs practical
    • Extended abstract was in Advances in Cryptology- Crypto 97 Proceedings, B. Kaliski ed, Springer-Verlag
    • Mihir Bellare and Phillip Rogaway, Collision-Resistant Hashing: Towards Making UOWHFs Practical, Extended abstract was in Advances in Cryptology- Crypto 97 Proceedings, Lecture Notes in Computer Science Vol. 1294, B. Kaliski ed, Springer-Verlag, 1997. Full paper available at http://www.cs.ucsd.edu/users/mihir/papers/tcr-hash.html.
    • (1997) Lecture Notes in Computer Science , vol.1294
    • Bellare, M.1    Rogaway, P.2
  • 13
    • 84958982846 scopus 로고    scopus 로고
    • Formal proofs for the security of signcryption
    • David Naccache and Pascal Pailler, editors, 5th International Workshop on Practice and Theory in Public Key Cryptosystems - PKC 2002
    • Joonsang Baek, Ron Steinfeld, and Yuliang Zheng. Formal proofs for the security of signcryption. In David Naccache and Pascal Pailler, editors, 5th International Workshop on Practice and Theory in Public Key Cryptosystems - PKC 2002, pp. 80-98, LNCS Vol. 2274, 2002.
    • (2002) LNCS , vol.2274 , pp. 80-98
    • Baek, J.1    Steinfeld, R.2    Zheng, Y.3
  • 15
    • 33645605463 scopus 로고
    • Enhancing the strength of conventional cryptosystems
    • November
    • Ivan B. Damgård, Lars Ramkilde Knudsen. Enhancing the Strength of Conventional Cryptosystems, BRICS report RS-94-38, November 1994.
    • (1994) BRICS Report , vol.RS-94-38
    • Damgård, I.B.1    Knudsen, L.R.2
  • 17
    • 85016692748 scopus 로고
    • On the existence of statistically hiding bit commitment schemes and fail-stop signatures
    • Crypto '93, Springer-Verlag, Berlin
    • Ivan B. Damgård, Torben P. Pedersen, Birgit Pfitzmann: On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures; Crypto '93, LNCS 773, Springer-Verlag, Berlin 1994, 250-265.
    • (1994) LNCS , vol.773 , pp. 250-265
    • Damgård, I.B.1    Pedersen, T.P.2    Pfitzmann, B.3
  • 20
    • 33645606157 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Federal Information Processing Standards Publication, FIPS Pub 180-1: Secure Hash Standard (SHA-1), April 17, (1995), 14 pages
    • National Institute of Standards and Technology, Federal Information Processing Standards Publication, FIPS Pub 180-1: Secure Hash Standard (SHA-1), April 17, (1995), 14 pages.
  • 21
    • 0003979335 scopus 로고    scopus 로고
    • (Basic Tools), ISBN 0-521-79172-3, Cambridge University Press, June
    • Oded Goldreich, The Foundations of Cryptography, Volume 1 (Basic Tools), ISBN 0-521-79172-3, Cambridge University Press, June 2001.
    • (2001) The Foundations of Cryptography , vol.1
    • Goldreich, O.1
  • 25
    • 0021409284 scopus 로고
    • Probabilistic Encryption
    • Shafi Goldwasser and Silvio Micali. "Probabilistic Encryption, " JCSS (28), 1984, 270-299.
    • (1984) JCSS , Issue.28 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 26
    • 35048899238 scopus 로고    scopus 로고
    • Universal reencryption for mixnets
    • Tatsuaki Okamoto, editor, RSA Conference Cryptographers' Track, Springer-Verlag, San Francisco, California, USA, February
    • Philippe Golle, Markus Jakobsson, Ari Juels, and Paul Syverson. Universal reencryption for mixnets. In Tatsuaki Okamoto, editor, RSA Conference Cryptographers' Track, volume 2964 of LNCS, Springer-Verlag, pages 163-178, San Francisco, California, USA, February 2004.
    • (2004) LNCS , vol.2964 , pp. 163-178
    • Golle, P.1    Jakobsson, M.2    Juels, A.3    Syverson, P.4
  • 27
    • 0037519332 scopus 로고    scopus 로고
    • Practical and provably-secure commitment schemes from collision free hashing in Advances in Cryptology - CRYPTO96
    • Springer-Verlag
    • Shai Halevi and Silvio Micali, "Practical and Provably-Secure Commitment Schemes from Collision Free Hashing", in Advances in Cryptology - CRYPTO96, Lecture Notes in Computer Science 1109, Springer-Verlag, 1996, pp. 201-215.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 201-215
    • Halevi, S.1    Micali, S.2
  • 28
    • 0345253860 scopus 로고    scopus 로고
    • Construction of a pseudorandom generator from any one-way function
    • Johan Hastad, Rudich Impagliazzo, Leonid A. Levin, and Mike Luby, Construction of a Pseudorandom Generator from any One-Way Function. SIAM Journal on Computing, Vol. 28, No. 4, pp. 1364-1396, 1999.
    • (1999) SIAM Journal on Computing , vol.28 , Issue.4 , pp. 1364-1396
    • Hastad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 29
    • 8344289276 scopus 로고
    • Public randomness in cryptography
    • proceedings of CRYPTO 1992, October
    • Amir Herzberg and Mike Luby, "Public Randomness in Cryptography", proceedings of CRYPTO 1992, ICSI technical report TR-92-068, October, 1992.
    • (1992) ICSI Technical Report , vol.TR-92-068
    • Herzberg, A.1    Luby, M.2
  • 30
    • 33645587661 scopus 로고
    • EE Pub. no. 576, Dept of Electrical Engineering, Technion, Haifa, Israel, Feb.
    • Amir Herzberg and Shlomit Pinter, "Composite Ciphers", EE Pub. no. 576, Dept of Electrical Engineering, Technion, Haifa, Israel, Feb. 1986.
    • (1986) Composite Ciphers
    • Herzberg, A.1    Pinter, S.2
  • 31
    • 84880901653 scopus 로고    scopus 로고
    • The order of encryption and authentication for protecting communications (or: How Secure Is SSL?)
    • Crypto '01, J. Kilian ed., Springer-Verlag
    • Hugo Krawczyk, "The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)," In Crypto '01, pp. 310-331, LNCS Vol. 2139, J. Kilian ed., Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 310-331
    • Krawczyk, H.1
  • 34
    • 0027308007 scopus 로고
    • Cascade ciphers: The importance of being first
    • U.M. Maurer and J.L. Massey, Cascade ciphers: the importance of being first, Journal of Cryptology, Vol. 6, No. 1, pp. 55-61, 1993.
    • (1993) Journal of Cryptology , vol.6 , Issue.1 , pp. 55-61
    • Maurer, U.M.1    Massey, J.L.2
  • 37
    • 0004035649 scopus 로고    scopus 로고
    • Network Working Group, Internet Engineering Task Force (IETF)
    • T. Dierks, C. Allen, The TLS Protocol: Version 1.0, Network Working Group, Internet Engineering Task Force (IETF). Available online at http://www.ietf.org/rfc/rfc2246.txt.
    • The TLS Protocol: Version 1.0
    • Dierks, T.1    Allen, C.2
  • 39
    • 0018545449 scopus 로고
    • How to share a secret
    • Adi Shamir, How to share a secret, Comm. of the ACM, 22(11):612-613, 1979.
    • (1979) Comm. of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 41
    • 84948976239 scopus 로고    scopus 로고
    • Using hash functions as a hedge against chosen ciphertext attacks
    • Adv. in Cryptology - Proc. of Eurocrypt '2000
    • Victor Shoup, Using hash functions as a hedge against chosen ciphertext attacks, Adv. in Cryptology - Proc. of Eurocrypt '2000, LNCS 1807, pp. 275-288.
    • LNCS , vol.1807 , pp. 275-288
    • Shoup, V.1
  • 42
    • 84880883264 scopus 로고    scopus 로고
    • Improved online/online signature schemes
    • Joe Killian, editor, Proceedings of Crypto 01, Springer-Verlag, August
    • Adi Shamir and Yael Tauman. Improved online/online signature schemes. In Joe Killian, editor, Proceedings of Crypto 01, volume 2139 of LNCS, pages 355-367. Springer-Verlag, August 2001.
    • (2001) LNCS , vol.2139 , pp. 355-367
    • Shamir, A.1    Tauman, Y.2
  • 43
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost(signature+encryption) ≪ cost(signature)+cost(encryption)
    • Advances in Cryptology - CRYPTO'97, Berlin, New York, Tokyo, Springer-Verlag
    • Yuliang Zheng, Digital signcryption or how to achieve cost(signature+encryption) ≪ cost(signature)+cost(encryption), in Advances in Cryptology - CRYPTO'97, Berlin, New York, Tokyo, 1997, vol. 1294 of Lecture Notes in Computer Science, pp. 165-179, Springer-Verlag.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 165-179
    • Zheng, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.