-
3
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
IEEE
-
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption. Proceedings of The 38th Annual Symposium on Foundations of Computer Science, FOCS '97, pp. 394-405, IEEE, 1997.
-
(1997)
Proceedings of the 38th Annual Symposium on Foundations of Computer Science, FOCS '97
, pp. 394-405
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
4
-
-
84983089516
-
The security of the cipher block chaining message authentication code
-
JCSS, vol. 61, no. 3, pp. 362-399, 2000. Earlier version in Y. Desmedt, editor, Advances in Cryptology - CRYPTO '94, Springer-Verlag, Berlin Germany
-
M. Bellare, J. Kilian, and P. Rogaway. The security of the cipher block chaining message authentication code. JCSS, vol. 61, no. 3, pp. 362-399, 2000. Earlier version in Y. Desmedt, editor, Advances in Cryptology - CRYPTO '94, volume 839 of Lecture Notes in Computer Science, pages 341-358. Springer-Verlag, Berlin Germany, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 341-358
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
5
-
-
35248860702
-
A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications
-
E. Biham, editor, Advances in Cryptology - EUROCRYPT 2003 Springer-Verlag, Berlin Germany
-
M. Bellare, and T. Kohno. A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications. In E. Biham, editor, Advances in Cryptology - EUROCRYPT 2003, volume 2656 of Lecture Notes in Computer Science, pages 491-506. Springer-Verlag, Berlin Germany, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 491-506
-
-
Bellare, M.1
Kohno, T.2
-
6
-
-
26444526862
-
The EAX mode of operation
-
W. Meier and B. Roy, editors Springer-Verlag
-
M. Bellare, P. Rogaway, and D. Wagner. The EAX mode of operation. In W. Meier and B. Roy, editors, Fast Software Encryption, FSE 2004, Springer-Verlag, 2004.
-
(2004)
Fast Software Encryption, FSE 2004
-
-
Bellare, M.1
Rogaway, P.2
Wagner, D.3
-
7
-
-
85006024828
-
New types of cryptanalytic attacks using related keys
-
T. Helleseth, editor, Advances in Cryptology - EUROCRYPT '93, Springer-Verlag, Berlin Germany
-
E. Biham. New types of cryptanalytic attacks using related keys. In T. Helleseth, editor, Advances in Cryptology - EUROCRYPT '93, volume 765 of Lecture Notes in Computer Science, pages 398-409. Springer-Verlag, Berlin Germany, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.765
, pp. 398-409
-
-
Biham, E.1
-
8
-
-
84947265149
-
A block-cipher mode of operation for parallelizable message authentication
-
L. R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002 Springer-Verlag, Berlin Germany
-
J. Black and P. Rogaway. A block-cipher mode of operation for parallelizable message authentication. In L. R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 384-397. Springer-Verlag, Berlin Germany, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 384-397
-
-
Black, J.1
Rogaway, P.2
-
9
-
-
84958964353
-
Related key attacks on reduced round KASUMI
-
M. Matsui, editor, Fast Software Encryption, FSE 2001 Springer-Verlag, Berlin Germany
-
M. Blunden and A. Escott. Related key attacks on reduced round KASUMI. In M. Matsui, editor, Fast Software Encryption, FSE 2001, volume 2355 of Lecture Notes in Computer Science, pages 277-285. Springer-Verlag, Berlin Germany, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2355
, pp. 277-285
-
-
Blunden, M.1
Escott, A.2
-
11
-
-
58149148195
-
Specification of the 3GPP confidentiality and integrity algorithms
-
Evaluation report (version 2.0).
-
Evaluation report (version 2.0). Specification of the 3GPP confidentiality and integrity algorithms, Report on the evaluation of 3GPP confidentiality and integrity algorithms. Available at http://www.3gpp.org/tb/other/algorithms.htm.
-
Report on the Evaluation of 3GPP Confidentiality and Integrity Algorithms
-
-
-
12
-
-
0242656061
-
A concrete security analysis for 3GPP-MAC
-
T. Johansson, editor, Fast Software Encryption, FSE 2003 Springer-Verlag, Berlin Germany
-
D. Hong, J-S. Kang, B. Preneel and H. Ryu. A concrete security analysis for 3GPP-MAC. In T. Johansson, editor, Fast Software Encryption, FSE 2003, volume 2887 of Lecture Notes in Computer Science, pages 154-169. Springer-Verlag, Berlin Germany, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2887
, pp. 154-169
-
-
Hong, D.1
Kang, J.-S.2
Preneel, B.3
Ryu, H.4
-
14
-
-
0242656059
-
OMAC: One-Key CBC MAC
-
T. Johansson, editor, Fast Software Encryption, FSE 2003 Springer-Verlag, Berlin Germany
-
T. Iwata and K. Kurosawa. OMAC: One-Key CBC MAC. In T. Johansson, editor, Fast Software Encryption, FSE 2003, volume 2887 of Lecture Notes in Computer Science, pages 129-153. Springer-Verlag, Berlin Germany, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2887
, pp. 129-153
-
-
Iwata, T.1
Kurosawa, K.2
-
15
-
-
26444501990
-
On the correctness of security proofs for the 3GPP confidentiality and integrity algorithms
-
K. G. Paterson, editor, Cryptography and Coding, Ninth IMA International Conference Springer-Verlag, Berlin Germany
-
T. Iwata and K. Kurosawa. On the correctness of security proofs for the 3GPP confidentiality and integrity algorithms. In K. G. Paterson, editor, Cryptography and Coding, Ninth IMA International Conference, volume 2898 of Lecture Notes in Computer Science, pages 306-318. Springer-Verlag, Berlin Germany, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2898
, pp. 306-318
-
-
Iwata, T.1
Kurosawa, K.2
-
16
-
-
35248857083
-
On the Security of CTR+CBC-MAC
-
K. Nyberg and H.M. Heys, editors, Selected Areas in Cryptography, 9th Annual Workshop (SAC 2002) Springer-Verlag, Berlin Germany
-
J. Jonsson. On the Security of CTR+CBC-MAC. In K. Nyberg and H.M. Heys, editors, Selected Areas in Cryptography, 9th Annual Workshop (SAC 2002), volume 2595 of Lecture Notes in Computer Science, pages 76-93. Springer-Verlag, Berlin Germany, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2595
, pp. 76-93
-
-
Jonsson, J.1
-
17
-
-
84945137421
-
Encryption modes with almost free message integrity
-
B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001 Springer-Verlag, Berlin Germany
-
C.S. Jutla. Encryption modes with almost free message integrity. In B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 529-544. Springer-Verlag, Berlin Germany, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 529-544
-
-
Jutla, C.S.1
-
18
-
-
84946822383
-
Provable security of KASUMI and 3GPP encryption mode f8
-
C. Boyd, editor, Advances in Cryptology - ASIACRYPT 2001 Springer-Verlag, Berlin Germany
-
J-S. Kang, S-U. Shin, D. Hong and O. Yi. Provable security of KASUMI and 3GPP encryption mode f8. In C. Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, pages 255-271. Springer-Verlag, Berlin Germany, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 255-271
-
-
Kang, J.-S.1
Shin, S.-U.2
Hong, D.3
Yi, O.4
-
19
-
-
0037722918
-
Analysis of 3gpp-MAC and two-key 3gpp-MAC
-
L. R. Knudsen and C. J. Mitchell. Analysis of 3gpp-MAC and two-key 3gpp-MAC. Discrete Applied Mathematics, vol. 128, no. 1, pp. 181-191, 2003.
-
(2003)
Discrete Applied Mathematics
, vol.128
, Issue.1
, pp. 181-191
-
-
Knudsen, L.R.1
Mitchell, C.J.2
-
20
-
-
26444493472
-
CWC: A high-performance conventional authenticated encryption mode
-
W. Meier and B. Roy, editors Springer-Verlag
-
T. Kohno, J. Viega, and D. Whiting. CWC: A high-performance conventional authenticated encryption mode. In W. Meier and B. Roy, editors, Fast Software Encryption, FSE 2004, Springer-Verlag, 2004.
-
(2004)
Fast Software Encryption, FSE 2004
-
-
Kohno, T.1
Viega, J.2
Whiting, D.3
-
21
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
April
-
M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput., vol. 17, no. 2, pp. 373-386, April 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
22
-
-
0035750947
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
P. Rogaway, M. Bellare, J. Black, and T. Krovetz. OCB: a block-cipher mode of operation for efficient authenticated encryption. Proceedings of ACM Conference on Computer and Communications Security, ACM CCS 2001, ACM, 2001.
-
(2001)
Proceedings of ACM Conference on Computer and Communications Security, ACM CCS 2001, ACM
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovetz, T.4
|