메뉴 건너뛰기




Volumn 3357, Issue , 2004, Pages 182-197

About the security of ciphers (semantic security and pseudo-random permutations)

Author keywords

[No Author keywords available]

Indexed keywords

SEMANTICS; COSTS; CRYPTOGRAPHY; DATA PRIVACY; MATHEMATICAL MODELS; PROBABILITY; SECURITY OF DATA;

EID: 26444517444     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30564-4_13     Document Type: Article
Times cited : (45)

References (11)
  • 1
    • 34547363710 scopus 로고    scopus 로고
    • A Concrete Security Treatment of Symmetric Encryption: Analysis of the des Modes of Operation
    • IEEE, New York
    • M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. Proc. of the 38th FOCS. IEEE, New York, 1997.
    • (1997) Proc. of the 38th FOCS
    • Bellare, M.1    Desai, A.2    Jokipii, E.3    Rogaway, P.4
  • 2
    • 35048841016 scopus 로고    scopus 로고
    • Concrete Security Characterization of PRFs and PRPs: Reduction and Applications
    • Springer-Verlag, Berlin
    • A. Desai and S. Miner. Concrete Security Characterization of PRFs and PRPs: Reduction and Applications. Asiacrypt '00, LNCS 1976, 503-516. Springer-Verlag, Berlin, 2000.
    • (2000) Asiacrypt '00, LNCS , vol.1976 , pp. 503-516
    • Desai, A.1    Miner, S.2
  • 3
    • 85028838274 scopus 로고
    • On the Cryptographic Applications of Random Functions
    • Springer-Verlag, Berlin
    • O. Goldreich, S. Goldwasser, and S. Micali. On The Cryptographic Applications of Random Functions. Crypto '84, LNCS 196. Springer-Verlag, Berlin, 1985.
    • (1985) Crypto '84, LNCS , vol.196
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 5
    • 35248863065 scopus 로고    scopus 로고
    • A Tweakable Enciphering Mode
    • Springer-Verlag, Berlin
    • S. Halevi and P. Rogaway. A Tweakable Enciphering Mode. Crypto '03, LNCS 2729, 482-499. Springer-Verlag, Berlin, 2003.
    • (2003) Crypto '03, LNCS , vol.2729 , pp. 482-499
    • Halevi, S.1    Rogaway, P.2
  • 6
    • 0033704913 scopus 로고    scopus 로고
    • Complete Characterization of Security Notions for Probabilistic Private-Key Encryption
    • ACM Press, New York
    • J. Katz and M. Yung. Complete Characterization of Security Notions for Probabilistic Private-Key Encryption. Proc. of the 32nd STOC. ACM Press, New York, 2000.
    • (2000) Proc. of the 32nd STOC
    • Katz, J.1    Yung, M.2
  • 7
    • 0023984964 scopus 로고
    • How to Construct Pseudorandom Permutations from Pseudorandom Functions
    • M. Luby and Ch. Rackoff. How to Construct Pseudorandom Permutations from Pseudorandom Functions. SIAM Journal of Computing, 17(2):373-386, 1988.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, Ch.2
  • 8
    • 0024983231 scopus 로고
    • Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks
    • ACM Press, New York
    • M. Naor and M. Yung. Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks. Proc. of the 22nd STOC, 427-437. ACM Press, New York, 1990.
    • (1990) Proc. of the 22nd STOC , pp. 427-437
    • Naor, M.1    Yung, M.2
  • 9
    • 33645588107 scopus 로고    scopus 로고
    • About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations)
    • Springer-Verlag, Berlin, Pull version available from
    • D. H. Phan and D. Pointcheval. About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations). SAC '04. Springer-Verlag, Berlin, 2004. Pull version available from http://www.di.ens.fr/users/pointche/.
    • (2004) SAC '04.
    • Phan, D.H.1    Pointcheval, D.2
  • 10
    • 84974554584 scopus 로고
    • Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
    • Springer-Verlag, Berlin
    • C. RackofT and D. R. Simon. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. Crypto '91, LNCS 576, 433-444. Springer-Verlag, Berlin, 1992.
    • (1992) Crypto '91, LNCS , vol.576 , pp. 433-444
    • Rackoft, C.1    Simon, D.R.2
  • 11
    • 84890522850 scopus 로고
    • Communication Theory of Secrecy Systems
    • C. E. Shannon. Communication Theory of Secrecy Systems. Bell System Technical Journal, 28(4):656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.