메뉴 건너뛰기




Volumn 3017, Issue , 2004, Pages 427-445

New security proofs for the 3GPP confidentiality and integrity algorithms

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS; MOBILE TELECOMMUNICATION SYSTEMS; SECURITY OF DATA;

EID: 26444467043     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-25937-4_27     Document Type: Article
Times cited : (29)

References (23)
  • 4
    • 84983089516 scopus 로고
    • The security of the cipher block chaining message authentication code
    • JCSS, vol. 61, no. 3, pp. 362-399, 2000. Earlier version in Y. Desmedt, editor, Advances in Cryptology - CRYPTO '94, Springer-Verlag, Berlin Germany
    • M. Bellare, J. Kilian, and P. Rogaway. The security of the cipher block chaining message authentication code. JCSS, vol. 61, no. 3, pp. 362-399, 2000. Earlier version in Y. Desmedt, editor, Advances in Cryptology - CRYPTO '94, volume 839 of Lecture Notes in Computer Science, pages 341-358. Springer-Verlag, Berlin Germany, 1994.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 341-358
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 5
    • 35248860702 scopus 로고    scopus 로고
    • A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications
    • E. Biham, editor, Advances in Cryptology - EUROCRYPT 2003 Springer-Verlag, Berlin Germany
    • M. Bellare, and T. Kohno. A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications. In E. Biham, editor, Advances in Cryptology - EUROCRYPT 2003, volume 2656 of Lecture Notes in Computer Science, pages 491-506. Springer-Verlag, Berlin Germany, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 491-506
    • Bellare, M.1    Kohno, T.2
  • 7
    • 85006024828 scopus 로고
    • New types of cryptanalytic attacks using related keys
    • T. Helleseth, editor, Advances in Cryptology - EUROCRYPT '93, Springer-Verlag, Berlin Germany
    • E. Biham. New types of cryptanalytic attacks using related keys. In T. Helleseth, editor, Advances in Cryptology - EUROCRYPT '93, volume 765 of Lecture Notes in Computer Science, pages 398-409. Springer-Verlag, Berlin Germany, 1993.
    • (1993) Lecture Notes in Computer Science , vol.765 , pp. 398-409
    • Biham, E.1
  • 8
    • 84947265149 scopus 로고    scopus 로고
    • A block-cipher mode of operation for parallelizable message authentication
    • L. R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002 Springer-Verlag, Berlin Germany
    • J. Black and P. Rogaway. A block-cipher mode of operation for parallelizable message authentication. In L. R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 384-397. Springer-Verlag, Berlin Germany, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 384-397
    • Black, J.1    Rogaway, P.2
  • 9
    • 84958964353 scopus 로고    scopus 로고
    • Related key attacks on reduced round KASUMI
    • M. Matsui, editor, Fast Software Encryption, FSE 2001 Springer-Verlag, Berlin Germany
    • M. Blunden and A. Escott. Related key attacks on reduced round KASUMI. In M. Matsui, editor, Fast Software Encryption, FSE 2001, volume 2355 of Lecture Notes in Computer Science, pages 277-285. Springer-Verlag, Berlin Germany, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2355 , pp. 277-285
    • Blunden, M.1    Escott, A.2
  • 11
    • 58149148195 scopus 로고    scopus 로고
    • Specification of the 3GPP confidentiality and integrity algorithms
    • Evaluation report (version 2.0).
    • Evaluation report (version 2.0). Specification of the 3GPP confidentiality and integrity algorithms, Report on the evaluation of 3GPP confidentiality and integrity algorithms. Available at http://www.3gpp.org/tb/other/algorithms.htm.
    • Report on the Evaluation of 3GPP Confidentiality and Integrity Algorithms
  • 12
    • 0242656061 scopus 로고    scopus 로고
    • A concrete security analysis for 3GPP-MAC
    • T. Johansson, editor, Fast Software Encryption, FSE 2003 Springer-Verlag, Berlin Germany
    • D. Hong, J-S. Kang, B. Preneel and H. Ryu. A concrete security analysis for 3GPP-MAC. In T. Johansson, editor, Fast Software Encryption, FSE 2003, volume 2887 of Lecture Notes in Computer Science, pages 154-169. Springer-Verlag, Berlin Germany, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2887 , pp. 154-169
    • Hong, D.1    Kang, J.-S.2    Preneel, B.3    Ryu, H.4
  • 14
    • 0242656059 scopus 로고    scopus 로고
    • OMAC: One-Key CBC MAC
    • T. Johansson, editor, Fast Software Encryption, FSE 2003 Springer-Verlag, Berlin Germany
    • T. Iwata and K. Kurosawa. OMAC: One-Key CBC MAC. In T. Johansson, editor, Fast Software Encryption, FSE 2003, volume 2887 of Lecture Notes in Computer Science, pages 129-153. Springer-Verlag, Berlin Germany, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2887 , pp. 129-153
    • Iwata, T.1    Kurosawa, K.2
  • 15
    • 26444501990 scopus 로고    scopus 로고
    • On the correctness of security proofs for the 3GPP confidentiality and integrity algorithms
    • K. G. Paterson, editor, Cryptography and Coding, Ninth IMA International Conference Springer-Verlag, Berlin Germany
    • T. Iwata and K. Kurosawa. On the correctness of security proofs for the 3GPP confidentiality and integrity algorithms. In K. G. Paterson, editor, Cryptography and Coding, Ninth IMA International Conference, volume 2898 of Lecture Notes in Computer Science, pages 306-318. Springer-Verlag, Berlin Germany, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2898 , pp. 306-318
    • Iwata, T.1    Kurosawa, K.2
  • 16
    • 35248857083 scopus 로고    scopus 로고
    • On the Security of CTR+CBC-MAC
    • K. Nyberg and H.M. Heys, editors, Selected Areas in Cryptography, 9th Annual Workshop (SAC 2002) Springer-Verlag, Berlin Germany
    • J. Jonsson. On the Security of CTR+CBC-MAC. In K. Nyberg and H.M. Heys, editors, Selected Areas in Cryptography, 9th Annual Workshop (SAC 2002), volume 2595 of Lecture Notes in Computer Science, pages 76-93. Springer-Verlag, Berlin Germany, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2595 , pp. 76-93
    • Jonsson, J.1
  • 17
    • 84945137421 scopus 로고    scopus 로고
    • Encryption modes with almost free message integrity
    • B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001 Springer-Verlag, Berlin Germany
    • C.S. Jutla. Encryption modes with almost free message integrity. In B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 529-544. Springer-Verlag, Berlin Germany, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 529-544
    • Jutla, C.S.1
  • 18
    • 84946822383 scopus 로고    scopus 로고
    • Provable security of KASUMI and 3GPP encryption mode f8
    • C. Boyd, editor, Advances in Cryptology - ASIACRYPT 2001 Springer-Verlag, Berlin Germany
    • J-S. Kang, S-U. Shin, D. Hong and O. Yi. Provable security of KASUMI and 3GPP encryption mode f8. In C. Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, pages 255-271. Springer-Verlag, Berlin Germany, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 255-271
    • Kang, J.-S.1    Shin, S.-U.2    Hong, D.3    Yi, O.4
  • 19
    • 0037722918 scopus 로고    scopus 로고
    • Analysis of 3gpp-MAC and two-key 3gpp-MAC
    • L. R. Knudsen and C. J. Mitchell. Analysis of 3gpp-MAC and two-key 3gpp-MAC. Discrete Applied Mathematics, vol. 128, no. 1, pp. 181-191, 2003.
    • (2003) Discrete Applied Mathematics , vol.128 , Issue.1 , pp. 181-191
    • Knudsen, L.R.1    Mitchell, C.J.2
  • 20
    • 26444493472 scopus 로고    scopus 로고
    • CWC: A high-performance conventional authenticated encryption mode
    • W. Meier and B. Roy, editors Springer-Verlag
    • T. Kohno, J. Viega, and D. Whiting. CWC: A high-performance conventional authenticated encryption mode. In W. Meier and B. Roy, editors, Fast Software Encryption, FSE 2004, Springer-Verlag, 2004.
    • (2004) Fast Software Encryption, FSE 2004
    • Kohno, T.1    Viega, J.2    Whiting, D.3
  • 21
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • April
    • M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput., vol. 17, no. 2, pp. 373-386, April 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.