-
1
-
-
34547363710
-
A Concrete Security Treatment of Symmetric Encryption: Analysis of the des Modes of Operation
-
IEEE, New York
-
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. Proc. of the 38th FOCS. IEEE, New York, 1997.
-
(1997)
Proc. of the 38th FOCS
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
2
-
-
35048841016
-
Concrete Security Characterization of PRFs and PRPs: Reduction and Applications
-
Springer-Verlag, Berlin
-
A. Desai and S. Miner. Concrete Security Characterization of PRFs and PRPs: Reduction and Applications. Asiacrypt '00, LNCS 1976, 503-516. Springer-Verlag, Berlin, 2000.
-
(2000)
Asiacrypt '00, LNCS
, vol.1976
, pp. 503-516
-
-
Desai, A.1
Miner, S.2
-
3
-
-
85028838274
-
On the Cryptographic Applications of Random Functions
-
Springer-Verlag, Berlin
-
O. Goldreich, S. Goldwasser, and S. Micali. On The Cryptographic Applications of Random Functions. Crypto '84, LNCS 196. Springer-Verlag, Berlin, 1985.
-
(1985)
Crypto '84, LNCS
, vol.196
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
5
-
-
35248863065
-
A Tweakable Enciphering Mode
-
Springer-Verlag, Berlin
-
S. Halevi and P. Rogaway. A Tweakable Enciphering Mode. Crypto '03, LNCS 2729, 482-499. Springer-Verlag, Berlin, 2003.
-
(2003)
Crypto '03, LNCS
, vol.2729
, pp. 482-499
-
-
Halevi, S.1
Rogaway, P.2
-
6
-
-
0033704913
-
Complete Characterization of Security Notions for Probabilistic Private-Key Encryption
-
ACM Press, New York
-
J. Katz and M. Yung. Complete Characterization of Security Notions for Probabilistic Private-Key Encryption. Proc. of the 32nd STOC. ACM Press, New York, 2000.
-
(2000)
Proc. of the 32nd STOC
-
-
Katz, J.1
Yung, M.2
-
7
-
-
0023984964
-
How to Construct Pseudorandom Permutations from Pseudorandom Functions
-
M. Luby and Ch. Rackoff. How to Construct Pseudorandom Permutations from Pseudorandom Functions. SIAM Journal of Computing, 17(2):373-386, 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, Ch.2
-
8
-
-
0024983231
-
Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks
-
ACM Press, New York
-
M. Naor and M. Yung. Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks. Proc. of the 22nd STOC, 427-437. ACM Press, New York, 1990.
-
(1990)
Proc. of the 22nd STOC
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
9
-
-
33645588107
-
About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations)
-
Springer-Verlag, Berlin, Pull version available from
-
D. H. Phan and D. Pointcheval. About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations). SAC '04. Springer-Verlag, Berlin, 2004. Pull version available from http://www.di.ens.fr/users/pointche/.
-
(2004)
SAC '04.
-
-
Phan, D.H.1
Pointcheval, D.2
-
10
-
-
84974554584
-
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
-
Springer-Verlag, Berlin
-
C. RackofT and D. R. Simon. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. Crypto '91, LNCS 576, 433-444. Springer-Verlag, Berlin, 1992.
-
(1992)
Crypto '91, LNCS
, vol.576
, pp. 433-444
-
-
Rackoft, C.1
Simon, D.R.2
-
11
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
C. E. Shannon. Communication Theory of Secrecy Systems. Bell System Technical Journal, 28(4):656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
|