-
2
-
-
84880876495
-
On-Line Ciphers and the Hash-CBC Constructions
-
Springer-Verlag
-
M. Bellare, A. Boldyreva, L. Knudsen, and C. Namprempre. On-Line Ciphers and the Hash-CBC Constructions. Crypto '01, LNCS 2139, 292-309. Springer-Verlag, 2001.
-
(2001)
Crypto '01, LNCS
, vol.2139
, pp. 292-309
-
-
Bellare, M.1
Boldyreva, A.2
Knudsen, L.3
Namprempre, C.4
-
3
-
-
0031351741
-
A Concrete Security Treatment for Symmetric Encryption
-
IEEE
-
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A Concrete Security Treatment for Symmetric Encryption. Proc. 38th of FOCS, 394-403. IEEE, 1997.
-
(1997)
Proc. 38th of FOCS
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
4
-
-
84957629783
-
Relations among Notions of Security for Public-Key Encryption Schemes
-
Springer-Verlag
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations Among Notions of Security for Public-Key Encryption Schemes. Crypto '98, LNCS 1462, 26-45. Springer-Verlag, 1998.
-
(1998)
Crypto '98, LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
5
-
-
84957665479
-
On the Construction of Variable-Input-Length Ciphers
-
Springer-Verlag
-
M. Bellare and P. Rogaway. On the Construction of Variable-Input-Length Ciphers. FSE '99, LNCS 1636. Springer-Verlag, 1999.
-
(1999)
FSE '99, LNCS
, vol.1636
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
35048872523
-
On-line Encryption Schemes: New Security Notions and Constructions
-
Springer-Verlag, Berlin
-
A. Boldyreva and N. Taesombut. On-line Encryption Schemes: New Security Notions and Constructions. RSA Conf 2004, LNCS, - Springer-Verlag, Berlin, 2003.
-
(2003)
RSA Conf 2004, LNCS
-
-
Boldyreva, A.1
Taesombut, N.2
-
7
-
-
35248852884
-
Concealment and Its Applications to Authenticated Encryption
-
Springer-Verlag
-
Y. Dodis and J. H. An. Concealment and Its Applications to Authenticated Encryption. Eurocrypt '03, LNCS 2656, 312-329. Springer-Verlag, 2003.
-
(2003)
Eurocrypt '03, LNCS
, vol.2656
, pp. 312-329
-
-
Dodis, Y.1
An, J.H.2
-
8
-
-
0031632567
-
Concurrent Zero-Knowledge
-
ACM Press, New York
-
C. Dwork, M. Naor, and A. Sahai. Concurrent Zero-Knowledge. Proc. of the 30th STOC, 409-418. ACM Press, New York, 1998.
-
(1998)
Proc. of the 30th STOC
, pp. 409-418
-
-
Dwork, C.1
Naor, M.2
Sahai, A.3
-
9
-
-
35048878096
-
Authenticated On-line Encryption
-
Springer-Verlag, To appear
-
P. A. Fouque, A. Joux, G. Martinet, and F. Valette. Authenticated On-line Encryption. Selected Areas in Cryptography '03, LNCS. Springer-Verlag, 2003. To appear.
-
(2003)
Selected Areas in Cryptography '03, LNCS
-
-
Fouque, P.A.1
Joux, A.2
Martinet, G.3
Valette, F.4
-
11
-
-
24144492130
-
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
-
Springer-Verlag
-
P. A. Fouque, A. Joux, and G. Poupard. Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. Selected Areas in Cryptography '04, LNCS. Springer-Verlag, 2004. http://www.di.ens.fr/~fouque/pubs/.
-
(2004)
Selected Areas in Cryptography '04, LNCS
-
-
Fouque, P.A.1
Joux, A.2
Poupard, G.3
-
12
-
-
0003979335
-
-
Cambridge University Press, Weizmann Institute of Science, Basic Tools
-
O. Goldreich. Foundations of Cryptography. Cambridge University Press, Weizmann Institute of Science, 2001. Basic Tools.
-
(2001)
Foundations of Cryptography
-
-
Goldreich, O.1
-
13
-
-
0022793132
-
How to Construct Random Functions
-
O. Goldreich, S. Goldwasser, and S. Micali. How to Construct Random Functions. Journal of the ACM, 33(4):210-217, 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 210-217
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
15
-
-
35248863065
-
A Tweakable Enciphering Mode
-
Springer-Verlag
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. A Tweakable Enciphering Mode. Crypto '03, LNCS. Springer-Verlag, 2003.
-
(2003)
Crypto '03, LNCS
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
16
-
-
35048815851
-
Cryptographic message syntax. S/MIME Working Group of the IETF
-
March
-
R. Housley. Cryptographic message syntax. S/MIME Working Group of the IETF, Internet-draft draft-ietf-smime-cms-12.txt, March 1999.
-
(1999)
Internet-draft Draft-ietf-smime-cms-12.txt
-
-
Housley, R.1
-
17
-
-
38149093714
-
Blockwise-Adaptive Attackers: Revisiting the (in)security of some provably secure Encryptions Modes: CBC, GEM, IACBC
-
Springer-Verlag
-
A. Joux, G. Martinet, and F. Valette. Blockwise-Adaptive Attackers: Revisiting the (in)security of some provably secure Encryptions Modes: CBC, GEM, IACBC. Crypto '02, LNCS 2442, 17-31. Springer-Verlag, 2002.
-
(2002)
Crypto '02, LNCS
, vol.2442
, pp. 17-31
-
-
Joux, A.1
Martinet, G.2
Valette, F.3
-
18
-
-
0033704913
-
Complete characterization of security notions for probabilistic private-key encryption
-
ACM Press
-
J. Katz and M. Yung. Complete characterization of security notions for probabilistic private-key encryption. STOC '00. ACM Press, 2000.
-
(2000)
STOC '00.
-
-
Katz, J.1
Yung, M.2
-
19
-
-
35048849275
-
-
NBS. FIPS PUB 81 - DES Modes of Operation, December 1980
-
NBS. FIPS PUB 81 - DES Modes of Operation, December 1980.
-
-
-
-
20
-
-
84947912552
-
All-or-nothing encryption and the package transform
-
Springer-Verlag
-
R. Rivest. All-or-nothing encryption and the package transform. In FSE '97, LNCS 1267. Springer-Verlag, 1997.
-
(1997)
FSE '97, LNCS
, vol.1267
-
-
Rivest, R.1
-
21
-
-
84880904783
-
OAEP Reconsidered
-
Springer-Verlag, Berlin
-
V. Shoup. OAEP Reconsidered. Crypto '2001, LNCS 2139, 239-259. Springer-Verlag, Berlin, 2001.
-
(2001)
Crypto '2001, LNCS
, vol.2139
, pp. 239-259
-
-
Shoup, V.1
|